New cyber attacks from Iran hit US enterprises focusing on energy sector, the offensive has been revealed by American officials and private security experts. A new series of cyber attacks from Iran hit US enterprises, the offensive has been revealed by American officials and private security experts. The attacks are classified as âpotentially destructiveâ and targeted IT […]
Chinese hackers who breached Google in 2010 are responsible for the recent violation to Google Companyâs Surveillance Database according officials revelations. Google data breach is reality and Google Companyâs Surveillance Database has been violated by the same hackers who breached Google’network in 2010, the attackers have obtained the access to the companyâs tracking system for […]
Governments, and in particular US one, are principal buyers of zero-day vulnerabilities according a report published by Reuters. Zero-days exploits are considered a primary ingredient for success of a cyber attack, the knowledge of zero-day flaw gives to the attacker guarantee of success, state-sponsored hackers and cyber criminals consider zero-day exploits a precious resources around […]
China and US governments continue to exchange accusations about the continuing incursions into the respective national networks. China and US governments continue to exchange accusations about the continuing incursions into the respective national networks, the cyber attacks are mainly motivated by sabotage and cyber espionage purposes and are increasing exponentially. US government and intelligence agencies […]
Verizon has issued the â2013 Data Breach Investigations Reportâ that investigates on a series of documented data breaches. Verizonâs RISK Team, in collaboration with other 18 partners, has issued the â2013 Data Breach Investigations Reportâ that investigates on a series of documented data breaches. Since 2008 the company yearly publishes data related to principal incidents occurred during […]
Recent cyber attacks against North and South Korea are inflaming the debate on the importance of cyber security, governments are massively investing in the improvement of cyber capabilities to be prepared to mitigate the increasing number of offensives. China is considered the most aggressive state, according principal security firms and cyber experts, from its country […]
Continues my overview of the main security reports published by leading companies that produce interesting analysis on the analysis of cyber threats, today I desire to introduce the data proposed by Solutionary in the “2013 Global Threat Intelligence Report” (registration is required). The GTIR report provides insight into prevalent cyber threats identified in 2012 thanks […]
In many occasion we have discussed about the consequences of monitoring activities on internet and communication channels operated by governments all over the world, in particular of the censorship and persecutions operated by authoritarian regimes. In discussion is the technological support often provide by Western IT company in the name of business that totally ignore […]
A report titled âResilient Military Systems and the Advanced Cyber Threatâ written  by Defense Science Board (DSB), a Federal Advisory Committee established to provide independent advice to the Secretary of Defense, presented alarming scenarios on US nationâs military considered unprepared for a full-scale cyber-conflict. The 138-page report alerts Pentagon on the necessity to improve cyber […]
The new is very curious and represents the demonstration that cyber threats could not be analyzed separately, security need a global approach, we cannot distinguish between cybercrime and cyber warfare but we must be focused on the cyber menaces, their effects and the risks connected to adoption of not appropriate security measures. The case is […]