3-5-2 Directive – The Chinese government s to replace foreign hardware and software with its national technology within the next three years. Officials from the Beijing government ordered all government offices and public institutions to replace foreign hardware and software with Chinese solutions within the next three years. The Government has issued a directive, tracked […]
DARPA announced the deployment of the ASOM technology which will be used to inspect critical equipment to detect counterfeit microelectronics. The presence of counterfeit microelectronics in cybersecurity equipment is considered a critical problem for the US Government, in military sector the hardware qualification has assumed a crucial importance for national cyber security strategy. The US DARPA supports the development of the […]
Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by cyber criminals and in cyber attacks during state sponsored operations in cyber warfare scenarios. This malicious software presents a wide range of purposes and functionalities, they are used to steal information or to destroy control […]
No doubt, the news of the beginning of the year is the alleged theft of the source of the Symantec antivirus. The news is sensational, “They stole everything to the police station!”, hilarious but very serious. Let’s try to resume the events. A group that calling itself the Lords of Dharmaraja has posted online a […]