• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Microsoft disrupts SEABORGIUM ’s ongoing phishing operations
  • VNC instances exposed to Internet pose critical infrastructures at risk
  • SOVA Android malware now also encrypts victims' files
  • A new PyPI Package was found delivering fileless Linux Malware
  • Iron Tiger APT is behind a supply chain attack that employed messaging app MiMi
  • A flaw in Xiaomi phones using MediaTek Chips could allow to forge transactions
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber warfare (Page 115)

Cyber warfare

Iran from cyber warfare to the oil war

Winds of war blowing in the Middle East, increasingly insistent rumors of a possible attack on Iran by Israel or the U.S.. In internet it is possible to find many news regarding the topic that declare both Iran and nations opposing them seem intentioned...

March 7, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Security 

Mud against Anonymous using Zeus malware

Symantec company recently has disclosed the news that the collective Anonymous has deceived his supporters favoring the spread and installing of Zeus malware on their machines. The charge is heavy and would undermine the trust that underpins the recruitment...

March 6, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Digital ID  Hacking  Intelligence  Malware 

NASA unprepared for cyber attacks

Everything started last week when has been announced that a laptop stolen from NASA during last year contained command codes used to control the International Space Station. The news is sensations as worrying, is it possible to store so sensible information...

March 5, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Intelligence  Security 

Young cyber army, cyber threat or resource to enhance?

We live in economically tumultuous days and even more in the cyberspace. Not a day goes by that you do not observe a striking hack, yet another multinational ridiculed and made bare and vulnerable to human eyes. It's happened with Sony, with RSA with Stratfor,...

February 29, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Security 

Syria, a massacre began on the web

Syria massacre shocks the world, syrian army has repeatedly bombed the protest city of Homs killing several hundred civilians. The images of the bombings and violence have been broadcasted by the main satellites television Al-Arabiya and Al Jazera,...

February 26, 2012  By Pierluigi Paganini   Posted In  Cyber warfare 

Cyber arms race, too many shadows on the future

The Mehr News Agency has published a declaration of brigadier general Gholamreza Jalali collected during an official conference that demonstrate the high interest in warfare of Iran. “The US is downsizing its army for bigger cyber defense infrastructure....

February 24, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Security 

Critical infrastructures & manipulation of the name Anonymous

What are the main dangers for our infrastructures? Too much threats which any country is exposed. The situation is bleak, suddenly the sectors of defense found themselves vulnerable to cyber threats. Once nations shown their proud arms, flaunt power,...

February 22, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Security 

Stopped antivirus for Iran, controversial penalty

I have just read the news that Iran will be banned the purchase of antivirus systems, a kind of technological embargo with clear reference to the virus Stuxnet and the need of the country to prevent further infection to any control systems of critical...

February 20, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Malware  Security 

Censorship – Why Anonymous is interested to the Great Firewall of China?

  The Chinese government is famous for the high level of monitoring implemented on the internet and in the specific on all the new social media, that is the modern form of censorship, a model that several countries all over the world are taking...

February 17, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Security 

Stuxnet “neutralized” – Who sows the wind storm gathers!

The news has caused much uproar in the scientific community, according European and U.S. officials and private experts the iranian scientists have isolated and made harmless the Stuxnet malware that has infected the control systems of the nuclear plants...

February 15, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Malware 


« First‹ Previous111112113114115116117Next ›
Page 115 of 117



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT