Japan institutions victim of cyber espionage, is it cyber warfare?
One of the biggest cyber threat is cyber espionage, it's the sign of the technological era in which every devices surround has an intelligence component that could be exploited. Governments first,...
View ArticleDangerous waves of malware are transforming cyberspace in a jungle
The cyberspace is becoming a jungle of malware, a place where the danger is just around the corner. Governments, cyber criminals, hacktivist and terrorist are focusing their activities in the new...
View ArticleMalware,Botnet & cyber threats,what is happening to the cyberspace?
The article proposes an analysis of the main cyber threats that worry security experts and that are profoundly changing the cyber space. The exponential growth of the number of cyber threats and...
View ArticleAdobe Code Signing Certificate used to sign malware, who to blame?
It's happened again, cyber criminals have stolen digital certificates related to companies recognized reliable to sign malicious code.This time the victim is Adobe and according its security chief,...
View ArticleTeam GhostShell hacktivists against temples of knowledge
In this days the hacking group Team GhostShell claimed credit for the hack of servers of the 100 principal universities from around the world, including Stanford, Princeton Harvard, the University of...
View ArticleIsrael vs Iran.The strategic importance of 5th domain,the cyberspace
Time passes and the dispute between Iran and Israel is becoming increasingly more complex to manage. Apparently everything seems crystallized waiting for one of the contenders make the first move, in...
View ArticleFrom CISPA to Obama’s executive order on national cybersecurity
During the last days worldwide internet community expressed great concern on the possibility of a reintroduction of The Cyber Intelligence Sharing and Protection act (CISPA) before the US House by...
View ArticlePwn2Own 2013 Contest – Samsung Galaxy S4 and iPhone 5 0-day exploits
At last HP's Pwn2Own 2013 contest hacking teams from Japan and China compromised iPhone 5 running iOS 6 and iOS 7 and a Samsung Galaxy S4.During the last HP's Pwn2Own 2013 contest at Information...
View ArticleUK cyber strategy discussed in ISC report 2011/2012
The elaboration of a proper cyber strategy is one the main target of intelligence services all around the world. We often discuss of US and Israel, but also European governments are pushing to...
View ArticleBanking trojan hit a large number of Islamic Mobile Banking Customers
Security researchers at InterCrawler discovered a Banking trojan which infected a large number of devices the Middle East belonging to Islamic Banks.IntelCrawler cyber intelligence firm discovered a...
View Article
More Pages to Explore .....