There is no doubt that through the analysis of the operations of a State in cyber space it is possible to create a political profile of the country itself, discover the level of technology available and design covenants and relations with other countries. Not a day passes without discussion on the hostile Iran, which would seem […]
The continued technology push that is shaping our society during the last decade has brought an exponential increase in computer crimes, every technology innovation has in fact represented an opportunity for industry of crimeto make profitable frauds and business. The cyber crime has many facets, cybercrime fact manifests itself in countless forms and contextualized in relation […]
Winds of war blowing in the Middle East, increasingly insistent rumors of a possible attack on Iran by Israel or the U.S.. In internet it is possible to find many news regarding the topic that declare both Iran and nations opposing them seem intentioned to attack. In this stage, the contenders are engaged in a mutual and intense […]
The news is sensational and is associated with the imminent spread of the new operating system from Microsoft, Windows 8. The Redmond has announced in its systems the presence of a “kill switch” feature, a system that allows the company to remotely access the terminal to proceed with the killing of processes that could cause […]
For several days the news circulating online about a planned blackout of Int the rnet for million of users on 8 March decided by FBI to deal with cyber threats. The enemy to fight is named DNSChanger Trojan, a malware that has infected milion of computers all over the world in more than 100 countries. The story begins […]
Where can I find money? At the bank of course, this is the thought which underlies dell’orietamento of cyber crime that seems to have targeted the banking industry and its services. The event is not new but the intensification of efforts in this area is troubling . The banking sector is considered a strategic sector […]
By now the news of successful attacks perpetrated against private companies are no more surprising except sometimes for inefficiency of the implemented security policies . The Wall Street Journal has reported the news that the telecoms company Nortel Networks has been repeatedly exploited by Chinese hackers for a long time, almost a decade. The former Nortel […]
In the last decade we have witnessed an extraordinary evolution of those agents technically defined as the term “malware” in several respects as: functional characteristics developing process distribution channels field of use In the past we used to differenciate the malware in groups whose members were deeply identified by distinct behaviors, hence the origin of […]
Koobface virus is undoubtedly considered as the malware of social network because it uses them as spread channel. We have repeatedly mentioned the incredible power of social networking media, platforms that reach a global audience with a simple click, obvious that such a capability could be attractive to criminal organizations for the spread of malware. […]