virus

Flashback? Are you joking? There aren’t malware for MacFlashback? Are you joking? There aren’t malware for Mac

Flashback? Are you joking? There aren’t malware for Mac

Yesterday I discussed with a friend and colleague Francesco on the lack of awareness of Apple's users on malware that…

13 years ago
Stuxnet & Duqu, update on cyber weapons usageStuxnet & Duqu, update on cyber weapons usage

Stuxnet & Duqu, update on cyber weapons usage

We all know about the malware Stuxnet and Duqu considered unanimously the first examples of cyber weapon developed by a…

13 years ago
Cyber WeaponsCyber Weapons

Cyber Weapons

Article Published on The Hacker New Magazine - April Edition "Cyber_Warfare" First let's try to provide a definition of cyber-weapon,…

13 years ago
Chinese hackers & Operation ‘Luckycat’ against Japan, Tibet and IndiaChinese hackers & Operation ‘Luckycat’ against Japan, Tibet and India

Chinese hackers & Operation ‘Luckycat’ against Japan, Tibet and India

Recently experts monitored several targeted attacks against Tibetan activist organizations including the International Campaign for Tibet and the Central Tibet…

13 years ago
Duqu – Cyber weapons factory still operating … it’s just the beginningDuqu – Cyber weapons factory still operating … it’s just the beginning

Duqu – Cyber weapons factory still operating … it’s just the beginning

We all remember the decision of the western states to prohibit the sale of anti-virus systems to Tehran, penalties determined…

13 years ago
Face to Face with Duqu malwareFace to Face with Duqu malware

Face to Face with Duqu malware

Once again we discuss about Stuxnet, cyber weapons and of the malware that appears derivate from the dangerous virus. The international scientific community…

13 years ago
China again victim of cyber attacksChina again victim of cyber attacks

China again victim of cyber attacks

We have always been accustomed to reading incursions of Chinese cyber army into networks belonging to foreign private companies and government institutions.…

13 years ago
Millions US government email addresses in the hands of the cybercrimeMillions US government email addresses in the hands of the cybercrime

Millions US government email addresses in the hands of the cybercrime

It has repeatedly reiterated the need for a cyber strategy to reduce risks related to cyber threats from various sources,…

13 years ago
Anonymous fake OS, who is behind it?Anonymous fake OS, who is behind it?

Anonymous fake OS, who is behind it?

In recent days, by chance I discussed with colleagues the relationship between the Vatican and Anonymous groups because I consider the Holy See a…

13 years ago
CIA and the intelligence components of the thingsCIA and the intelligence components of the things

CIA and the intelligence components of the things

Unfortunately, we rarely stop to reflect on the reality that surrounds us and the potential of the devices we use…

13 years ago