NIST released the draft of cybersecurity framework, which outlines how private companies can protect themselves against cyberattacks, and security breaches. The National Institute of Standards and Technology has released a draft of the cybersecurity framework for private companies and infrastructure networks as part of President Obama’s executive order. The order has the primary goal to improve the […]
Hacker, a figure considered today one of the most precious professional by Government organizations, private businesses and intelligence agencies. It’s a shortage! All the report produced by principal security firms remark a meaningful increase in the number of cyber attacks against organizations, government offices and private companies. The increased number of cyber incidents is animating […]
FireEye security firm released World War C report to explain nation-state motives behind advanced Nation-state driven cyber attacks. Nation-state driven cyber attacks are routinely conducted on a global scale to defend national sovereignty and project national power. We are living in the cyber era, human conflict is involving also the fifth domain of warfare, the cyberspace. As never […]
A study titled “Iran:How a Third Tier Cyber Power Can Still Threaten the United States” states that Iran has sufficient cyber capabilities to attack the US Iran has sufficient cyber capabilities to attack the US causing serious damages to the critical infrastructures of the country. The news doesn’t surprise the cybersecurity experts that know very […]
Snowden revealed that NSA designed a system called XKeyscore considered the “widest-reaching” architecture for developing intelligence from the internet. XKeyscore, NSA former technicians Edward Snowden revealed that the agency has another secret program to spy on user’s Internet experience tracking practically every his activity … PRISM isn’t an isolated surveillance program. The NSA tool collects ‘nearly […]
Imperva released a Web Application Attack Report that provides an overview of the principal cyber security events occurred during the last 12 months. Imperva security firm has just released last annual Web Application Attack Report (WAAR) that provides an overview of the principal cyber security events occurred in the cyberspace during the last 12 months. […]
Stellar Wind, Prism,EvilOlive, ShellTrumpet are the names of some of the US massive surveillance programs revealed recently by the press … The Guardian published new uncomfortable documents that revealed another surveillance program dubbed Stellar Wind that was started in 2001, after the tragic events of 9/11. According to the secret documents obtained by the Guardian, the program was authorized by President George W. […]
US law enforcers suggest a kill switch for mobile devices to principal manufactures and Apple adapts. The idea of US law enforcers is the realization of a kill switch on mobile devices that would be used in case of theft. New York’s top prosecutor, State Attorney General Eric Schneiderman, and San Francisco District Attorney George Gascón promoted […]
Palantir Technologies is considered the principal company behind the design of software used for PRISM program, think of it as the work of a single company is truly an understatement. Palantir Technologies, this is the most popular company name referred when discussing those who have supported the U.S. Government in the development of massive surveillance […]
Edward Snowden is the person responsible for one of the most significant leaks in US political history, he is former technical assistant for the CIA and currently is working at defence contractor Booz Allen Hamilton. Edward Snowden, this name is destined to enter into the history, a single man has compromised the secrecy of the […]