stuxnet

Wiper, assumptions and difficulties analyzing a malware

During last April many press agencies and security firms published a story related to the detection of a new malware,…

13 years ago

U.S. admit cyber attacks.Who will decide in future conflict,humans or machines?

The U.S. are one of the most advanced country under cyber warfare perspective, we have read a lot on its…

13 years ago

Malware, a cyber threat increasingly difficult to contain

Article published on Hakin9 IT Security Magazine - August 2012 When we speak about malware we introduce one of the…

13 years ago

Gauss, evidence of ongoing cyber-war and cyber espionage campaigns

As expected a new malware for purposes of cyber espionage was once again identified by the Team of Kaspersky Lab.…

13 years ago

New Madi instance and “AC/DC” virus, Middle East as shooting range

The Middle East has always been considered an area of the planet's turbulent for the continuing conflict and political tensions…

13 years ago

UK cyber strategy discussed in ISC report 2011/2012

The elaboration of a proper cyber strategy is one the main target of intelligence services all around the world. We…

13 years ago

The importance of security requirements in design of SCADA systems

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 06 2012 The article exposes the main issues…

13 years ago

The ‘cyber war’ era began long ago

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace  US military strategist John Boyd states: “War…

13 years ago

Cyber war, the strategic importance of the defense

I was reading an interesting article on the cyber wars I was attracted by the comparison of Stuxnet to the…

13 years ago

The mystery of a massive cyber attack on Iran

Winds of cyber war blow Iran, the political situation is becoming difficult to manage, exacerbating the tones of a psychological…

13 years ago

This website uses cookies.