Crazy … a year ago on a warm June evening I began to formalize some ideas on a concept of great relevance today, the “social network poisoning”. I am the person who coined the term, proposing the scientific community with some colleagues who share my ideas as Andrea Zapparoli Manzoni and Kalos Bonasia. Immediately I inserted […]
Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 05 2012. The article offers an overview on cyber security issues relating to sports events, competitions that are a priority target for terrorists and cyber criminals. What weight has the information security component on the overall organization? An analysis of the main types of computer attacks and possible consequences in a highly critical contest such as a sporting event. Introduction Whenever we see a major sporting event we […]
Every intelligence discipline is used to acquire information concerning specifc subjects, the common categories of these methodologies include human intelligence (HUMINT), signals intelligence (SIGINT), imagery intelligence (IMINT), measurement and signatures intelligence (MASINT), and open source intelligence (OSINT) and Geospatial Intelligence. Each disciplines is used by governments to collect data on their adversaries and competitors. Similar […]
The events of recent days from the closure of the Megaupload web site to the heavy offensive of the Anonymous group have distracted media attention from important cyber operations, in my opinion of military matrix, against Japan. Last week several Cyber attacks have been conducted against Japan institutions and corporates, the National Security of Japan […]
All of us have received news regarding the incident occurred to Stratfor during this days, and we have learned that the company is specialized in reserch and information gathering for forecast and analisys purpose. There is a great business behind this kind of research. Of course we are speaking of one of the main company […]