• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Italy, France and Singapore Warn of a Spike in ESXI Ransomware
  • Royal Ransomware adds support for encrypting Linux, VMware ESXi systems
  • Italian National Cybersecurity Agency (ACN) warns of massive ransomware campaign targeting VMware ESXi servers
  • Microsoft attributes Charlie Hebdo data leak to Iran-linked NEPTUNIUM APT
  • Security Affairs newsletter Round 405 by Pierluigi Paganini
  • CISA adds Oracle, SugarCRM bugs to its Known Exploited Vulnerabilities Catalog
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Intelligence (Page 128)

Intelligence

Governments are increasing cyber security on social media

Many experts are sure, the new horizons of intelligence are in the social media and in the ability to control them. Governments are more careful on the analysis of social media and the vast amount of information which they hold. Intelligence agencies...

August 1, 2012  By Pierluigi Paganini   Posted In  Intelligence  Security 

New Madi instance and “AC/DC” virus, Middle East as shooting range

The Middle East has always been considered an area of the planet's turbulent for the continuing conflict and political tensions among the states that inhabit it. In the last two years, the tensions seem to have intensified and with it has grown the diffusion...

July 26, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware 

UK cyber strategy discussed in ISC report 2011/2012

The elaboration of a proper cyber strategy is one the main target of intelligence services all around the world. We often discuss of US and Israel, but also European governments are pushing to reinforce their presence in the cyber space. The fear of cyber...

July 19, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Intelligence  Security 

Mahdi campaign, ongoing cyber-espionage in the Middle East

Again another great investigation of the excellent team of Kaspersky lab and its partner Seculert firm has discovered an ongoing campaign to conduct a large scale infiltration of computer systems in the Middle East area. The campaign has targeted individuals...

July 18, 2012  By Pierluigi Paganini   Posted In  Intelligence  Malware  Security 

Anonymous, Wikileaks & Par:anoIA, evolution of hacktivism

In the last months we have assisted of an intensification of the operations that we common locate under the hacktivism umbrella. Millions of people claim freedom of internet access and the respect of human rights. The right to Internet access, also known...

July 17, 2012  By Pierluigi Paganini   Posted In  Hacking  Intelligence  Security 

International Collaboration to Bring You Authoritative Insider Perspectives on the Global Cyber Safety and Security Status (4/4)

  Article published on The Malta Indipendent             Ron Kelson                    Pierluigi Paganini by Ron Kelson - Vice Chair ICT Gozo Malta Project, Pierluigi Paganini...

July 17, 2012  By Pierluigi Paganini   Posted In  Intelligence  Security 

Syria Files, Wikileaks, Anonymous and dirty affairs

Big outcry on Wikileaks that last week has published more that 2.4 million emails allegedly obtained from continuous hack against Syrian government and organizations connected to the regime. The correspondence of “Syrian political figures, ministries...

July 10, 2012  By Pierluigi Paganini   Posted In  Hacking  Intelligence  Security 

A view on the economic impact of cyber attacks, from US to China

On June 28th, a FBI official declared before a House panel that the phenomenon of cyber espionage is increasing with an alarming trend. We are living a period of great crisis and the intellectual property is becoming a privileged target for cyber attacks. It...

July 6, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Intelligence  Security 

Drones vulnerable to hijacking, concerns on security and privacy

Last week a saw a satellite image taken by Google Earth related to a mysterious vehicle, apparently an unmanned aerial vehicle (UAV), parked at Lockheed Martin’s Skunk Works facility in Palmdale, California. “Skunk Works” LM’s Advanced Development...

July 2, 2012  By Pierluigi Paganini   Posted In  Intelligence  Security 

Dalai Lama + Mac OS X = APT with Tibet malware

Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used in Tibet against Uyghur hacktivists, a Turkic ethnic group living in Eastern and Central Asia. The instance of Tibet malware...

June 30, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware  Security 


« First‹ Previous124125126127128129130131132Next ›Last »
Page 128 of 139



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version