US SOCOM admitted that Counter-Terrorism Special Forces scrutinize FaceBook and other social media to handle potentially useful information. Exactly two years ago…
You can find a manual on how to hack drones online, simply searching on Google. This can lead to severe…
A new wave of malvertising attacks finalized to cyber espionage is targeting military contractors to military secrets and intellectual property.…
A team of researchers developed an hardware trojan undetectable to most detection techniques raising the question on need of proper…
DARPA is conducting a program codenamed CBMEN (Content-Based Mobile Edge Networking) for sharing of reconnaissance and Intelligence data on battlefield…
US Air Force published a notice that includes a paragraph on the use of social media platforms for computer network…
A report titled “Resilient Military Systems and the Advanced Cyber Threat” written by Defense Science Board (DSB), a Federal Advisory…
The article is published on the last edition of PenTest AUDITING & STANDARDS 03 2012. Several reports published in the last…
As previously said the cyber crime industry is proving to be invoiced in a thriving company that knows no crisis.…
In these hours on the web is turning the news of a cyber attack performed by a group of Chinese…
This website uses cookies.