Hacktivism is considered one of the most interesting phenomena of the last year, despite this form of dissent is dated in the last years it has catalyzed the media attention with its exploit. Hacktivism is considered one of the main cyber threats and its operations have created serious problems to private businesses and governments, for […]
I’m just returned from the Cyber Threat Summit in Dublin, one of the most interesting European events in cyber security that gave me the opportunity to share opinion notes with expert professionals of international security context. The event revealed an alarming scenario on the main cyber threats, no matter if it is cybercrime, hacktivism, cyber […]
The summer is ending and we must be prepared to a new season of attacks of Anonymous collective, last weeks we have registered several attacks of the group of hackers that suggest a warm autumn. Last week with a series of attacks Anonymous targets Electronics Manufacturer AVX, the hackers have hit the website for electronics […]
Several months ago I wrote on the future of the famous group of hacktivism, Anonymous explaining that the model the originated the movements was evolving in unpredictable way due the large consensus of the hackers and possible infiltration made by law enforcement and governments. According recent revelation inside the group there are two principal faction, […]
Anonymous maintained its promises, the hacktivists announced that would have gone forward to prove the inefficiency of the companies complicit of Australian Government. They have leaked data from the AAPT , Australia’s third largest land line telecommunications company, victim of a data breach occurred during the last week. Anonymous has published data tonight, it seems […]
One of the biggest cyber threat is cyber espionage, it’s the sign of the technological era in which every devices surround has an intelligence component that could be exploited. Governments first, cyber criminal after, have discovered the great efficiency of malware used to steal sensible information to the victims, no matter if we are speaking […]
Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace The military strategist Carl von Clausewitz stated: “All war presupposes human weakness and seeks to exploit it.” Malicious software (malware) is software that is explicitly designed to exploit vulnerabilities in computing devices and human users to the malicious advantage of the malware […]
In the last months we have assisted of an intensification of the operations that we common locate under the hacktivism umbrella. Millions of people claim freedom of internet access and the respect of human rights. The right to Internet access, also known as the right to broadband, states that all individuals must be able to […]
In the last decade we have observed the raise of cyber attacks, no matter their purpose, cyber warfare or cyber espionage for military or private business, they have demonstrated how much dangerous is a cyber offensive. The U.S.’s leading cyberwarrior has estimated that private businesses are losing hundreds of billions to cyber espionage and cybercrimes, […]
I desire to tribute another article to the group that catch the worldwide attention of security community, Anonymous. Few years to consolidate its image become one of the most debated phenomenon on internet, many consider the collective a threat, many other the expression of a dissent to listen. Both interpretations are correct, but let’s think […]