• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Italy, France and Singapore Warn of a Spike in ESXI Ransomware
  • Royal Ransomware adds support for encrypting Linux, VMware ESXi systems
  • Italian National Cybersecurity Agency (ACN) warns of massive ransomware campaign targeting VMware ESXi servers
  • Microsoft attributes Charlie Hebdo data leak to Iran-linked NEPTUNIUM APT
  • Security Affairs newsletter Round 405 by Pierluigi Paganini
  • CISA adds Oracle, SugarCRM bugs to its Known Exploited Vulnerabilities Catalog
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Intelligence (Page 129)

Intelligence

The mystery of a massive cyber attack on Iran

Winds of cyber war blow Iran, the political situation is becoming difficult to manage, exacerbating the tones of a psychological battle growing. After the publishing of the news regarding the genesis of Stuxnet and Flame every actor of the conflict...

June 23, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware  Security 

Wikiboat against the Pentagon, risks on Anonymous evolution

We live in the cyber era, governments measure their capabilities in the cyberspace with reciprocal attacks of increasing complexity.Every government is developing an adequate cyber strategy investing huge quantity of money in the establishment of cyber...

June 21, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Security 

Deep Web and censorship

  We clarified the use of anonymizing networks is not only related to criminal intents, they represent in fact a powerful instrument to elude censorship introduced by governments in critical areas of the planet. We have provided the examples...

June 19, 2012  By Pierluigi Paganini   Posted In  Intelligence  Security 

The right to anonymity on Internet and legal implications

The demand of anonymity services is increased in response to the increase network monitoring and censorship,but the anonymity is a concept that induces fear. Everyday, all our web actions leave traces of ourselves and of our way of life through the...

June 14, 2012  By Pierluigi Paganini   Posted In  Intelligence  Laws and regulations  Security 

Cyber security during sporting events

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 05 2012.  The article offers an overview on cyber security issues relating to sports events, competitions that are a priority target for terrorists and...

June 13, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Security 

Flame and Stuxnet, the union is strength

During the Global Media and Technology Summit Eugene Kaspersky, CEO of Kaspersky Lab, revealed to the Reuters agency that the team of experts of his company has found strong similarities between part of the Flame source code and a 2009 version of Stuxnet. The...

June 12, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware  Security 

U.S. communication equipments subject to China cyber espionage

The new is disturbing, according to former and current intelligence sources Chinese companies have the ability to remotely access to the communication equipments sold to the United States and Western Countries. The revelation made by the open source intelligence...

June 10, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Security 

Increasing concerns on cyber warfare capabilities of the North Korea

According to the news published on Korea JoongAng Daily website, North Korea cyber army has been tracked attempting cyber attacks on Incheon International Airport systems spreading a virus planted in game programs. The information has been provided...

June 8, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Security 

Israel between cyber war and cyber warfare business

It's not a secret, Israel military is one of the most advanced and active cyber army that is using cyber-warfare to attack its enemy in the cyber space. For years Israel conducts cyber espionage and cyber offensive operations that allow the state to operate...

June 6, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Security 

Plan X, new lymph to US cyber warfare capabilities

Recent events have demonstrated the strategic importance of the cyber strategy the needs to chair the cyber space, many experts sustains that the cyber war era is just begun, due this reason the Pentagon is involving the private companies, universities...

June 4, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Security 


« First‹ Previous125126127128129130131132133Next ›Last »
Page 129 of 139



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version