Anonymous hacked the CIMD portal managed by the France’s Ministry of Defense to protest against French foreign arms trade operations. The Anonymous collective has hacked one of the websites managed by the France’s Ministry of Defense, the CIMD (Centre d’Identification des Materiels de la Defense). The hacktivists accessed the database and leaked it online to […]
The representatives of the Utah State confirmed that their systems experiences 300,000 hacking attacks a day due to the presence of the NSA Data Center. The Utah state computer systems experience 300,000 hacking attacks a day due to the presence of the NSA data center in the state. The Utah Data Center, also known as the […]
In May 2015, the Chinese security firm Qihoo 360 published a report on a Trojan called OceanLotus that was being used since 2012 for APT attacks in the Chinese market. The APT attacks based on the OceanLotus focused on government organizations, research institutes, maritime agencies, and companies specializing in other activities. At the time were […]
A new documentary titled Zero Days revealed that the Stuxnet cyber weapon was just a small part of a much bigger Information Warfare operation (code named “NITRO ZEUS”) against the Iranian civilian infrastructure. A new documentary titled Zero Days has revealed more disconcerting news on the Stuxnet worm, the first malware recognized by security industry as a […]
Malware researchers at PaloAlto discovered the Fysbis Trojan, a simple and an effective Linux threat used by the Russian cyberspy group Pawn Storm. Do you remember the Pawn Storm hacking crew? Security experts have identified this group of Russian hackers with several names, including APT28, Sofacy or Sednit, it has been active since at least 2007. The name Pawn Storm is used by security […]
The British Intelligence Agency GCHQ has a license to hack computers and devices, the UK’s Investigatory Powers Tribunal (IPT) ruled. This means that the UK Government is giving full power to its intelligence agency to spy on Britons as well as people living abroad. The verdict was issued on Friday after Privacy International and seven ISPs […]
Experts at Trend Micro discovered strains of BlackEnergy malware involved in the recent attacks against Ukrainian Mining and Railway Systems. BlackEnergy was in the headlines when the security industry examined the power outage occurred in Ukraine in December 2015. The BlackEnergy malware is a threat improved to target SCADA systems, the latest variant includes the KillDisk component developed to wipe […]
The FBI requests $38 Million to counter the threat of Going Dark, in particular asking more economic resources to break encryption when needed. The FBI Director James Comey has highlighted in different occasions the difficulties faced by law enforcement when dealing with encryption during their investigations. Now, the FBI is making its request for budget […]
According to Fox News, the Director of National Intelligence confirmed to the Senate that the Islamic State has used chemical weapons. In December, a European Parliament report warned that the ISIS organization has already smuggled CBRN material into the EU, the risk of WMD attacks is real. The intelligence experts speculate the IS has recruited experts with chemistry, physics […]
In the following brief I will describe kinetic plot based modern terrorism/Cyber-terrorism and religious affiliations. Both Jihadist and Non-Jihadist, organized crime associations, data and statistics to show that Radical Muslim Terrorism is the most prominent form in America today. Modern terrorism and cyberterrorism display the use of violence and threats to intimidate or coerce, normally […]