malware

OSINT research to discovery lucrative business of monitoring systems

The dramatic events of recent months have occurred in Syria should lead us all in deep thought. What value do…

14 years ago

China, cyber warfare and challenges for the future

When discuss on cyber warfare we cannot regardless of the role played by nations such as China, U.S. and Russia. In…

14 years ago

Cyber terrorism, cyber attacks against al Qaeda 2.0

The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we…

14 years ago

1-day exploits,Binary Diffing & patch management.The side threats

Recently ESET security firm has reported the latest version of the Blackhole exploit kit that has been updated to include…

14 years ago

Cyber Weapons

Article Published on The Hacker New Magazine - April Edition "Cyber_Warfare" First let's try to provide a definition of cyber-weapon,…

14 years ago

Chinese hackers & Operation ‘Luckycat’ against Japan, Tibet and India

Recently experts monitored several targeted attacks against Tibetan activist organizations including the International Campaign for Tibet and the Central Tibet…

14 years ago

VISA & MASTERCARD breach raises Security doubts on standard compliance

The Krebs on Security blog reported that there has been a security breach at Global Payments that “may involve more…

14 years ago

Duqu – Cyber weapons factory still operating … it’s just the beginning

We all remember the decision of the western states to prohibit the sale of anti-virus systems to Tehran, penalties determined…

14 years ago

Verizon Report, the wind of hacktivism pushes cybercrime

Just yesterday I completed a lengthy article regarding several aspects of cybercrime and their impact on private and military sectors. In a…

14 years ago

Face to Face with Duqu malware

Once again we discuss about Stuxnet, cyber weapons and of the malware that appears derivate from the dangerous virus. The international scientific community…

14 years ago

This website uses cookies.