Internet

How to use Tor Metrics to discover censorship, the Ethiopia caseHow to use Tor Metrics to discover censorship, the Ethiopia case

How to use Tor Metrics to discover censorship, the Ethiopia case

Tor Metrics Cyber intelligence units are working to develop tools and applications for a deep inspection of the hidden web…

13 years ago
Concerns for Chinese firms and the cyberespionageConcerns for Chinese firms and the cyberespionage

Concerns for Chinese firms and the cyberespionage

We often discuss about warfare and cyberespionage, focusing on the usage of technology to steal intellectual property of foreign states.…

13 years ago
2011 IC3 – Internet Crime Report2011 IC3 – Internet Crime Report

2011 IC3 – Internet Crime Report

In this article I desire to discuss about the data provided in the 2011 IC3 Internet Crime Report that provide…

13 years ago
DNSChanger , much ado about nothing and the wrong choiceDNSChanger , much ado about nothing and the wrong choice

DNSChanger , much ado about nothing and the wrong choice

 Summary of previous episodes In beginning of the year a news circulated on internet regarding the planned blackout of Internet…

13 years ago
Iran,Oil Industry under cyber attack,are we close to a military strike?Iran,Oil Industry under cyber attack,are we close to a military strike?

Iran,Oil Industry under cyber attack,are we close to a military strike?

A new cyber attack against Iran, in particular this time the Oil Industry was the target of a Malware Attack.…

13 years ago
Anonymous,from OpTrialAtHome to the streets,is time for changingAnonymous,from OpTrialAtHome to the streets,is time for changing

Anonymous,from OpTrialAtHome to the streets,is time for changing

Another Saturday, another round, as announced today the group Anonymous has targeted government sites to protest against British government policy. Nothing…

13 years ago
Anonymous, its strategy against censorship and the diversionary theoryAnonymous, its strategy against censorship and the diversionary theory

Anonymous, its strategy against censorship and the diversionary theory

Groups of hacktivist like Anonymous are the actual news of the global technology landscape, a new force with which and…

13 years ago
North Korea scares the WestNorth Korea scares the West

North Korea scares the West

According to US official declarations North Korea has added new sophisticated cyber weapons to its arsenal, the event causes much…

13 years ago
Japan and the privacy contradictionsJapan and the privacy contradictions

Japan and the privacy contradictions

The massive use of new technologies has often raised thorny questions about the privacy of network users. The most difficult…

13 years ago
US Experts say: Government Networks constantly hackedUS Experts say: Government Networks constantly hacked

US Experts say: Government Networks constantly hacked

For years, we have discussed the importance of appropriate cyber strategy and the necessity to preside over the main critical…

13 years ago