The group of Syrian Electronic Army hackers is intensification its hacking campaign pro-Assad. Details of the attacks against the HuffingtonPost UK, Twitter and the NYT. The Syrian Electronic Army once again successful in an attack, to be precise the popular group of hacker this time hacked into Twitter, Huffington Post and NY Times’ registry accounts modifying DNS records and […]
The use of technologies to support censorship is deplorable and condemnable but it must be considered that is a sad reality that has sustained the growth of a billionaire market. Many IT companies around the world are specialized in the providing of solutions used by authoritarian regimes to monitor internet use and persecute the opponents. […]
Recently I wrote a post to describe the national blackout occurred is Syria, the event officially justified by the regime as a technical problem but that according many experts it could be the result of Government censorship operation. The collective of Anonymous is sure that Syrian regime was responsible for the national outage which purpose […]
In this day my blog has dedicated a great attention to the security of social media, explaining the importance of new communication networks. Today the information is synonymous with power, due this consideration is critical develop the proper processes for its management. To acquire information today we infiltrate social networks, we attack forums and social […]
Big outcry on Wikileaks that last week has published more that 2.4 million emails allegedly obtained from continuous hack against Syrian government and organizations connected to the regime. The correspondence of “Syrian political figures, ministries and associated companies” between August 2006 and March 2012 has been defined embarrassing for the government of Damascus and its […]
Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used in Tibet against Uyghur hacktivists, a Turkic ethnic group living in Eastern and Central Asia. The instance of Tibet malware detected infects OS X machines and is spread following a consolidated schema for politically motivated […]
We clarified the use of anonymizing networks is not only related to criminal intents, they represent in fact a powerful instrument to elude censorship introduced by governments in critical areas of the planet. We have provided the examples of Syria and Iran, but the world is full of similar operations that introduce a detailed […]
Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of malicious software designed with the purpose to disrupt computer operation, gather sensitive information, or gain unauthorized access to victims systems. With the term we indicate in fact several types of malicious code such as computer […]
For years, we discuss the authorship of what is considered one of the most offensive cyber weapon of history, Stuxnet, a thousand voices were compared on the difficult question alternating assertions and denials. Always the principal international experts have suggested the U.S. as the authors of the cyber threat, but the main U.S. authorities have […]
Tor Metrics Cyber intelligence units are working to develop tools and applications for a deep inspection of the hidden web with the intent of steal classified secret documents of a potential adversary and to maintain the control over cybercrime and terrorists activities and communications. Let’s start from the beginning, which are the available metrics to […]