Are we able to ensure that every peripherals connected to our computers and present in our offices is proof of attack? The first answer will be ... “sure”. We observe same problem with our household appliance that are being more intelligent. The...
Are we able to ensure that every peripherals connected to our computers and present in our offices is proof of attack? The first answer will be ... “sure”. We observe same problem with our household appliance that are being more intelligent. The...
The SCADA systems at the Water utilities in Illinois were hacked by a malicious attacker. “the SCADA system was powered on and off, burning out a water pump.” This is what the hacker has posted giving proof of a direct compromise of the SCADA...
Last week I had the opportunity to discuss with my father of adverse economic situation and in particular of the Italian public spending. I have introduced some reference to the arms and in particular cyber weapons. What are they? What are the threats...
What is purpose for DNS cache poisoning attacks? DNS cache poisoning is an attack methodology used to compromise in the Domain Name System and is made introduceding data artifacts into a DNS name server's cache database that did not originate from...
F-Secure Researchers have discovered a digitally signed malware that has code signed with a stolen government certificate belonging to the Malaysian Agricultural Research and Development Institute. The issue has long been known and this attack methodic...
In recent months we have read many reports related the analysis of the famous malware and different assumptions about its genesis. Who designed the malicious agent? For what purpose? What features of Duqu we know? How can protect our structure...
In recent years social networks have succeeded in the historic feat of bringing to the web a growing number of users. Jupiter users, the elderly, individuals and businesses all within the large network, many, too much, share the total...
Once upon a time the espionage made by agents who essentially lived in complete anonymity and free of the past were able to recover the greatest amount of information about their objectives by building dangerous relationships with the reality...
Bitdefender reseachers have discovered a number of brute force attacks against several web site. The attacks have been done using a server at the Massachusetts Institute of Technology (MIT). The hacking attack against the MIT.edu infrastructure started...
Mac malware has been making some headlines in the last few months, as attackers have begun applying to OS X some of the tactics they've been using on Windows for decades. Security analysts have discovered several variants of the DevilRobber Mac OS X Trojan,...