stuxnet

2012, the threat of malware. Evolution in the mobile scenario

Wanting to try out hypotheses about the future of the spread of malware, we cannot help but examine the mobile…

14 years ago

Why the use of a cyber weapon has proved a winner?

In recent months one of the topics of greatest interest in the international scientific community has been the development of…

14 years ago

Hardware qualification, a must in a cyber strategy

We live in the era of free technology market , devices and appliances of all kinds can be found on…

14 years ago

The power of social networks

For years now we live with the confirmation of the importance of social networks and their impact on daily life.…

14 years ago

Stuxnet, Duqu and the sons of the “Tilded” platform

We all have heard of Stuxnet viruses, malware that has undoubtedly marked a new era in the field. It is…

14 years ago

Iran threat … are we close to the conflict?

These days, there are countless news regarding the Iranian government and its ability to pursue its objectives of a cyber…

14 years ago

Iran, the cyber threat … are we creating a new enemy ?

"Iran, the super power capable of threatening the world". This is the title of a hypothetical sensationalist article aimed to…

14 years ago

What should we expect from next cyber weapon? Hypothesis on Stuxnet 3

This 2011 was the year of the consecration of cyber weapons from a mediatic point of view. Awareness of the…

14 years ago

Duqu – The worst may still have to come for critical infrastructures

Duqu, a name that we are reading since several months and with whom we have called a malware that scares…

14 years ago

SCADA and vulnerabilities to critical infrastructures

Over the last few months there have been different events that led to the story than they can be dangerous…

14 years ago

This website uses cookies.