• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Russia is going to disconnect from the internet as part of a planned test
  • A new batch of 127 million records appears in the dark web
  • Astaroth Trojan relies on legitimate os and antivirus processes to steal data
  • Cryptojacking Coinhive Miners for the first time found on the Microsoft Store
  • Group-IB helped to arrest phone scammers profiting off the backs of the Russian elderly
  • Coffee Meets Bagel dating app confirms data breach
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Security (Page 220)

Security

Stuxnet, are we really safe now? No, of course!

Once again I draw inspiration from the argument "Stuxnet" on which much is being read on the web at this time, and a lot of which will be discussed in the years to come. From all the scientists Stuxnet was defined a deadly weapon, but why  if any direct...

January 31, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Malware  Security 
2

Symantec too many doubts, disable pcAnywhere software

Remember the sensational theft of the source code of the Symantec products occurred in the last weeks? On that occasion the company, with impeccable timing, immediately took the distance from the event claiming that its customers could remain calm because...

January 26, 2012  By Pierluigi Paganini   Posted In  Hacking  Security 
0

Anonymous “United as one, divided by zero” a click for freedom

In these days we have witnessed the escalation of operations conducted by the Anonymous group, the hacker group that is espressing a social dissent througth cyber attacks. The Internet world is profoundly changing, and the threat of hacktivist groups...

January 21, 2012  By Pierluigi Paganini   Posted In  Hacking  Security 
9

Which is the main cyber threat? The violated freedom

In these days we have witnessed the escalation of attacks who took the state of Israel as a target. Groups of hackers have coalesced to express their dissent against the policy government. I mention this case because I consider emblematic the answer provided...

January 20, 2012  By Pierluigi Paganini   Posted In  Security  Social Networks 
1

Symantec, the inconvenient truth on the data breach

Do you remember the case of Symantec and the theft of the source code of some of its products by an Indian group of hackers called the lord of Dharmaraja? On that occasion it was declared by Symantec officials that the source code of its products had been...

January 18, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 
0

Japan Aerospace Exploration Agency hit by malware

To news like this we are dangerously getting used, the scenarios change but the dynamics are often the same, viruses used such as cyber weapon that infect critical structures, causing loss of valuable information and that block system of target systems. The...

January 15, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware  Security 
0

Sykipot attacks U.S PKI infrastructures based on smart cards

In these hours on the web is turning the news of a cyber attack performed by a group of Chinese hackers against some U.S. Government Agencies. Once again, the weapon used against the strategic objectives is a cyber weapon, in particular it has been used...

January 14, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Digital ID  Hacking  Intelligence  Malware  Security 
2

Critical infrastructures – Main threats for 2G and 3G mobile networks

Which is the critical infrastructure of a country that is most exposed to cyber threat?  The question is difficult to answer, without doubts. Communication infrastructure is a vital component of every country and we add that unlike other infrastructure...

January 13, 2012  By Pierluigi Paganini   Posted In  Mobile  Security 
0

Cyber threats from military sector to business

Searching in Internet the words "Cyberwar" and "cyberware" you will immediately realize how high is the interest in the matter. An ocean of information that demonstates the growing interest in the matter and that awaken in many ancestral fears. The spectrum...

January 12, 2012  By Pierluigi Paganini   Posted In  Security 
8

“Cyber China” From Operation Aurora to China Cyber attacks Syndrome

Cyber China is considered the most active persistent collector of Western intelligence and intellectual property, is it a syndrome or China represents a real threat? When we think of China in relation to cyber warfare, we imagine an army of hackers...

January 8, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Security 
4


« First‹ Previous216217218219220221222223224Next ›Last »
Page 220 of 224




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More