IT administrator at Monju Nuclear Power Plant discovered that a malware-based attack infected a system in the reactor control room. On January 2nd one of the eight computers in the control room at Monju Nuclear Power Plant was compromised. An IT administrator has discovered that the system in the reactor control room had been accessed over […]
The NATO has announced to be close to launch two Cyber Response Teams to protect the infrastructures of the Alliance in the case of cyber attacks. NATO is establishing its reaction units to protect its infrastructure in case of cyber attacks, the organization will set-up exactly two teams for the purpose. NATO is considered a […]
Researchers from KONDA Security firm have discovered that the Russian hackers have stolen personal information of 54 Million Turkish Citizens. Unknown Russian hackers have reportedly stolen Personal details of nearly 54 million Turkish citizens, the data breach is clamorous if we consider that the figure represents nearly 70% of the whole Turkish population. The Hurriyet daily news […]
Due to the constant growth in the number of cyber attacks it is necessary to properly define the actions composing an incident response plan. FireEye firm published an interesting post on the need of incident response (IR) capabilities to reply numerous cyber attacks that daily hit almost any web service. Starting from the data proposed […]
The number of cyber attacks is increased in an impressive way, cyber criminals, hacktivists, independent and state-sponsored hackers are daily operating in cyberspace conducting more or less dangerous offensive. Everyone is exposed to concrete risks of cyber attacks, internet users, private business and government offices, thatâs why is fundamental to have a clear idea on […]
Remember the sensational theft of the source code of the Symantec products occurred in the last weeks? On that occasion the company, with impeccable timing, immediately took the distance from the event claiming that its customers could remain calm because the souce code stolen were older and in any case the data breanch was not […]