Intelligence

Flame malware, from genesis to the plot theory

In this article I desire to discuss about many personal doubts and beliefs regarding the Flame malware, first my idea…

14 years ago

China-made US military chip, security backdoor or debugging functionality?

During last days an insistent news circulated on the internet, a microchip used by the US military and manufactured in…

14 years ago

CIA, FBI, NSA, differents agencies for an unique intent…global monitoring

We have discussed several times regarding the intention of the FBI to create a special unit for internet monitoring and…

14 years ago

Al Qaeda continues to frighten the U.S, the cyber war is begun

Many experts are convinced that the death of Bin Laden marked the end of an ideological group that has been…

14 years ago

LinkedIN – Vulnerability in the authentication process and related risks

A serious vulnerability has been found in the authentication process of the popular network LinkedIN, the news published on the…

14 years ago

US vc China. Is cyber warfare gap increasing?

The Chinese offensive capabilities in cyberspace in this period are, more than ever, subject of great interest from the international…

14 years ago

Concerns for Chinese firms and the cyberespionage

We often discuss about warfare and cyberespionage, focusing on the usage of technology to steal intellectual property of foreign states.…

14 years ago

Has Anonymous infiltrated US Government? The insider issue

In last months we have a long discussed about the security status of US networks and infrastructures, we have described…

14 years ago

A picture of the Iran threat

The situation in Iran is becoming really critic, time go by and every diplomatic solution is not realizable. We have…

14 years ago

The Unknowns, hacker’s revenge in the name of security

It's happened, another group of hacker named The Unknowns has hacked several organizations, , including NASA and the U.S. Air…

14 years ago

This website uses cookies.