Operation Hangover is the title of a report published by Norman Shark that details a sophisticated cyberattack infrastructure that appears to originate from India, conducted by private threat actors with no evidence of state-sponsorship. Operation Hangover, this is the name assigned by Norman Shark’s security analyst team to an interesting report revealing a large and sophisticated cyber-attack […]
The news is circulating for days, the Iranian head of the national security forces , Esmail Ahmadi Moghadam, declared that low enforcement of the country is developing a software for “smart control” of social-networking sites, the authorities have understood that the control of the powerful platforms is more important filtering. Moghadam exposed the consideration made […]
Recently experts monitored several targeted attacks against Tibetan activist organizations including the International Campaign for Tibet and the Central Tibet Administration. Researchers suspect the involvement of China and on groups of hackers sponsored by the Beijing government. In multiple cases, we have seen how the Chinese government promotes and supports from the economic point of view […]
For years, we have discussed the importance of appropriate cyber strategy and the necessity to preside over the main critical infrastructures to defend them from cyber threats of any kind and in our imagination we have always considered the US as a country at the forefront. While the cyber security experts analyze the progress made […]
No doubt the last two years witnessed the true revolution in information technology world is the development and deployment of mobile systems. I speak of mobile systems and I avoid simply to define them “devices” because of their processing capacity equal to a common desktop. Unfortunately the development of the sector is not paid to the […]
The story is familiar to all, the Source Code, the Source code of property of Symantec company has been stolen and it has been object of negotiation between the group of hacker responsible of the crime and law enforcement agents who have acted to protect the company. Conclusion of the negotiation is that the precious […]
We are at an historical turning point today in U.S., and the situation is similar all over the world, threat of terrorist acts have been surpassed by cyber threats, this is the opinion of FBI Director Robert Mueller. Cyber crime, cyber-espionage, massive attacks, hacktivism, usage of cyber weapons against critical infrastructure are all phenomena that are increasing in frequency […]
So far this year we have witnessed an escalation of attacks against those who are considered the major superpowers on cyber warfare, U.S. and Israel. Real motivated attacks in cyberspace capable of paralyzing the critical services of the target countries and after this offensive is lawful expect a reply first under warfare matter and of […]
Remember the sensational theft of the source code of the Symantec products occurred in the last weeks? On that occasion the company, with impeccable timing, immediately took the distance from the event claiming that its customers could remain calm because the souce code stolen were older and in any case the data breanch was not […]
India, a nation technologically advanced, of which we have so much discussed in recent weeks. We have discussed about the interference of its government obsessed with desire to control private citizens, and every company operating in the domestic market. All is started with the Symantec case, the well-known manufacturer of security systems, victim of an […]