Quantcast
Channel: Cyberwarzone - cyber espionage
Browsing latest articles
Browse All 13 View Live

Image may be NSFW.
Clik here to view.

Japan institutions victim of cyber espionage, is it cyber warfare?

One of the biggest cyber threat is cyber espionage, it's the sign of the technological era in which every devices surround has an intelligence component that could be exploited. Governments first,...

View Article



Image may be NSFW.
Clik here to view.

Dangerous waves of malware are transforming cyberspace in a jungle

  The cyberspace is becoming a jungle of malware, a place where the danger is just around the corner. Governments, cyber criminals, hacktivist and terrorist are focusing their activities in the new...

View Article

Image may be NSFW.
Clik here to view.

Malware,Botnet & cyber threats,what is happening to the cyberspace?

The article proposes an analysis of the main cyber threats that worry security experts and that are profoundly changing the cyber space. The exponential growth of the number of cyber threats and...

View Article

Image may be NSFW.
Clik here to view.

Adobe Code Signing Certificate used to sign malware, who to blame?

 It's happened again, cyber criminals have stolen digital certificates related to companies recognized reliable to sign malicious code.This time the victim is Adobe and according its security chief,...

View Article

Image may be NSFW.
Clik here to view.

Team GhostShell hacktivists against temples of knowledge

In this days the hacking group Team GhostShell claimed credit for the hack of  servers of the 100 principal universities from around the world, including Stanford, Princeton Harvard, the University of...

View Article


Image may be NSFW.
Clik here to view.

Israel vs Iran.The strategic importance of 5th domain,the cyberspace

Time passes and the dispute between Iran and Israel is becoming increasingly more complex to manage. Apparently everything seems crystallized waiting for one of the contenders make the first move, in...

View Article

Image may be NSFW.
Clik here to view.

From CISPA to Obama’s executive order on national cybersecurity

 During the last days worldwide internet community expressed great concern on the possibility of a reintroduction of The Cyber Intelligence Sharing and Protection act (CISPA)  before the US House by...

View Article

Image may be NSFW.
Clik here to view.

Pwn2Own 2013 Contest – Samsung Galaxy S4 and iPhone 5 0-day exploits

At last HP's Pwn2Own 2013 contest hacking teams from Japan and China compromised iPhone 5 running iOS 6 and iOS 7 and a Samsung Galaxy S4.During the last HP's Pwn2Own 2013 contest at Information...

View Article


Image may be NSFW.
Clik here to view.

UK cyber strategy discussed in ISC report 2011/2012

The elaboration of a proper cyber strategy is one the main target of intelligence services all around the world. We often discuss of US and Israel, but also European governments are pushing to...

View Article


Image may be NSFW.
Clik here to view.

Banking trojan hit a large number of Islamic Mobile Banking Customers

Security researchers at InterCrawler discovered a Banking trojan which infected a large number of devices the Middle East belonging to Islamic Banks.IntelCrawler cyber intelligence firm discovered a...

View Article
Browsing latest articles
Browse All 13 View Live




Latest Images