Tor Metrics Cyber intelligence units are working to develop tools and applications for a deep inspection of the hidden web with the intent of steal classified secret documents of a potential adversary and to maintain the control over cybercrime and terrorists activities and communications. Let’s start from the beginning, which are the available metrics to […]
We often discuss about warfare and cyberespionage, focusing on the usage of technology to steal intellectual property of foreign states. Of course the countries that have valuable technology skills are most exposed to targeted attacks that daily try to steal information regarding hi tech projects. Japan, US and European Countries are preferred target of many […]
In this article I desire to discuss about the data provided in the 2011 IC3 Internet Crime Report that provide evidence of the Internet Crime Complaint Center (IC3) against cybercrime in US and of the obtained results. On May 8, 2000 from a partnership between NW3C, BJA and the FBI was born The Internet Fraud Complaint […]
Summary of previous episodes In beginning of the year a news circulated on internet regarding the planned blackout of Internet for millions of users on March 8th decided by FBI to deal with DNSChanger Trojan. The action must be done to stop the diffusion of the malware that has infected millions of computers all over […]
A new cyber attack against Iran, in particular this time the Oil Industry was the target of a Malware Attack. The news was widespread by Officials in the Iranian oil ministry, they say that their network and the country’s main oil export terminal were infected with a malware; due this event the government has taken […]
Another Saturday, another round, as announced today the group Anonymous has targeted government sites to protest against British government policy. Nothing new over last week, same goals, same mode of attack, the same result. On internet bounced messages of joy for having staged the second act of the operation called by the group #OpTrialAtHome. Let’s start making some reflections on the real utility of these […]
Groups of hacktivist like Anonymous are the actual news of the global technology landscape, a new force with which and against which confront. As repeatedly stressed I consider the moment of confrontation with the group a moment of growth for the IT professional in many ways, on all: having to deal with the cyber threat that […]
According to US official declarations North Korea has added new sophisticated cyber weapons to its arsenal, the event causes much concern in political and military. The dialogue between Western governments, and particularly the U.S, with the government in Pyongyang continues to be difficult, complicating the situation is the defiant attitude adopted by the North Korean government […]
The massive use of new technologies has often raised thorny questions about the privacy of network users. The most difficult issue to resolve in the necessary to reach a compromise to assure the users requirements of security and privacy. The debate generates heated arguments, confusion and sometimes decisions in apparent contrast. In Japan, to the multinational […]
For years, we have discussed the importance of appropriate cyber strategy and the necessity to preside over the main critical infrastructures to defend them from cyber threats of any kind and in our imagination we have always considered the US as a country at the forefront. While the cyber security experts analyze the progress made […]