""If you open the window for fresh air, you have to expect some flies to blow in" this is the Deng Xiaoping’s phrase, which summarizes the essence of the "Golden Shield Project" also Known as the "Great Firewall of China". The project is...
""If you open the window for fresh air, you have to expect some flies to blow in" this is the Deng Xiaoping’s phrase, which summarizes the essence of the "Golden Shield Project" also Known as the "Great Firewall of China". The project is...
In recent months we have read many reports related the analysis of the famous malware and different assumptions about its genesis. Who designed the malicious agent? For what purpose? What features of Duqu we know? How can protect our structure...
In recent years social networks have succeeded in the historic feat of bringing to the web a growing number of users. Jupiter users, the elderly, individuals and businesses all within the large network, many, too much, share the total...
Once upon a time the espionage made by agents who essentially lived in complete anonymity and free of the past were able to recover the greatest amount of information about their objectives by building dangerous relationships with the reality...
Few days ago I have partecipated to an open discussion started by Stefano Mele, a security and cyber-terrorism expert, on the development of Internet Content Monitor System by the Soviet government. In April, the "Russian Federal Service...
Trusteer Researchers have found a professional calling service that has been designed for cybercriminals needs. The service is organized to offer the extraction of sensitive information needed for bank fraud and identity theft from individuals. The security...
Can Cloud Computing Manage Serious Cyber Threats? U.S. Cyber Chief Says yes, personally I have several doubts regarding this opportunity. I draw inspiration in the article that I read and I quote to introduce the topic, dwelling on the words of Alexander...
The threat to the technological solutions and to the secrets of the United States in the cyber space is relevant. Foreign Organization, mainly Chinese and Russian are hunting for sensitive information of an economic and industrial nature, in public...