Yesterday I discussed with a friend and colleague Francesco on the lack of awareness of Apple’s users on malware that plague products of the house in Cupertino. This consideration is one of the reasons of the success in malware development for Apple, the users totally ignore that Apple machines are equivalent to any other kind of […]
We all know about the malware Stuxnet and Duqu considered unanimously the first examples of cyber weapon developed by a government to silent attacks critical enemy infrastructures. We have written a lot on the topic, we have followed with attention the excellent analysis made by experts of the sector such as Ralph Langner and the […]
Article Published on The Hacker New Magazine – April Edition “Cyber_Warfare” First let’s try to provide a definition of cyber-weapon, to do this I get inspiration from an article written by experts Thomas Rid and Peter McBurney. Correctly define cyber weapon has significant legal and political consequences as well as the security itself. The line […]
Recently experts monitored several targeted attacks against Tibetan activist organizations including the International Campaign for Tibet and the Central Tibet Administration. Researchers suspect the involvement of China and on groups of hackers sponsored by the Beijing government. In multiple cases, we have seen how the Chinese government promotes and supports from the economic point of view […]
We all remember the decision of the western states to prohibit the sale of anti-virus systems to Tehran, penalties determined to thwart the development of Iran’s nuclear program. A predictable decision that haven’t created any problem the state that seems has developed a new antivirus program to immunize the systems from the notorious Stuxnet virus. […]
Once again we discuss about Stuxnet, cyber weapons and of the malware that appears derivate from the dangerous virus. The international scientific community has defined a Stuxnet deadly weapon because been designed with a detailed analysis of final target environment supported by a meticulous intelligence work that for the first time in history has embraced the world of […]
We have always been accustomed to reading incursions of Chinese cyber army into networks belonging to foreign private companies and government institutions. The Beijing government has been accused of pursuing a very aggressive cyber strategy responsible for serious damage to foreign companies. An emblematic case of Nortel, the company spied on for a decade by Chinese hackers ended […]
It has repeatedly reiterated the need for a cyber strategy to reduce risks related to cyber threats from various sources, military, cyber crime or hacktivism. Cyber threats expose our intelligence agencies, our critical infrastructures and our companies to significant risks causing untold perfidious finance. In the area of cyber warfare governments have made considerable strides, gained awareness of the […]
In recent days, by chance I discussed with colleagues the relationship between the Vatican and Anonymous groups because I consider the Holy See a very attractive target for several reason. A few hours later the site of Vatican went down, while I was writing of the possibility of OpBlackout and regarding the basting operations to discredit the group in terms of […]
Unfortunately, we rarely stop to reflect on the reality that surrounds us and the potential of the devices we use every day in the office, at home and when we’re out. The technology behind each of them has became the main architect of their operation and no matter whether we are talking about our phone or […]