Intelligence

Stuxnet, Duqu & Conficker, a new generation of cyber weapons … even “without a father”

Cyber warfare expert John Bumgarner claims that the Stuxnet and Duqu virus have been active for much longer than previously…

14 years ago

Cybercrime, an industry that knows no crisis

  During this days I had the opportunity to read the results of a couple of surveys: The PricewaterhouseCoopers (PwC).…

14 years ago

“Mobile” intrigue … A prying eyes to carry around …

Let we use these ingredients to start some serious reflection on safety issues related to mobile devices: Robust growth in…

14 years ago

Cryptome, social networks and the inconvenient truth

Cryptome, known as Wikileaks’s competitor site  has published  online several reserved documents revealing that the police have access to information of social networks.  The documents describe how the police is able to access to Facebook user…

14 years ago

E-Corruption … “who controls the controller?”

The control of information is the main concern of Governments. More or less declared the major players of a precarious global economy have implemented digital surveillance systems, from India to China, passing Russia and…

14 years ago

Cloud…a long journey towards a secure paradigm

When I discussed with many colleagues regarding cloud paradigm most of them smiled declaring that we face yet another found…

14 years ago

How much cost malware production? Which are the processes for the production of virus? (Part.1)

It is clear that the question awaits an answer deterministic, but an assessment of the main factors that influence the "final expense". My idea is to understand what is the magnitude of…

14 years ago

ISP can’t be forced to filter transmissions inherent in copyright-infringing content

In recent months it has had discussions about the possibility of blocking sites that somehow support the distribution of pirated…

14 years ago

Water utilities hacked … another SCADA system attack

The SCADA systems at the Water utilities in Illinois were hacked by a malicious attacker. “the SCADA system was powered…

14 years ago

Cyber Threats, high social impact but … which is the level of awareness?

Last week I had the opportunity to discuss with my father of adverse economic situation and in particular of the…

14 years ago

This website uses cookies.