21/02/2011
The Cost of Cyber Crime

The estimates of the cost of cyber crime have until now failed to address the breadth of the problem and have not been able to provide a justifiable estimate of economic impact.

17/02/2011
French Strategy of Defense and Security of Information Systems

The "Agence nationale de la sécurité des systèmes d’information" (ANSSI) discloses the French strategy of defense and security of information systems. To prevent computer attacks and ensure the security of French citizens, businesses and of the Nation in cyberspace, the French strategy poses four strategic goals and seven lines of effort for public action.

16/02/2011
The new american cyber-strategy: Cyber 3.0

Cyber 3.0 is the name of the new strategy described by U.S. Deputy Defense Secretary William Lynn at the RSA security conference Tuesday.

14/02/2011
Al Qaeda and Associated Movements in 2011

Osama bin Laden´s al-Qaida has morphed into an array of regional terrorist groups that are using the Internet to recruit and train members at home, according to this report.

11/02/2011
Global Energy Cyberattacks: "Night Dragon"

Prima le centrali nucleari iraniane, e adesso alcuni dei principali impianti energetici occidentali. Questo rapporto di McAfee rivela che cracker, probabilmente cinesi, hanno violato i sistemi informatici di diverse compagnie energetiche dal novembre 2009, rubando una quantità immensa di dati sensibili. Non è ancora chiara la tipologia delle informazioni, ma quasi certamente sono legate ai processi di gestione e controllo delle centrali e, pertanto, potrebbero essere utilizzate per un attacco informatico su vasta scala.


1 |  2 |  3 |  4 |  5 |  6 |  7 |  8 |  9 |  10 |  11 |  12 |  13 |  14 |  15 |  16 |  17 |  18 |  19 |  20 |  21 |  22 |  23 |  24 |  25 |  26 |  27 |  28 |  29 |  30 |  31 |  32 |  33 |  34 |  35 |  36 |  37 |  38 |  39 |  40 |  41 |  42 |  43 |  44 |  45 |  46 |  47 |  48 |  49 |  50 |  51 |  52 |  53 |  54 |  55 |  56 |  57 |  58 |  59 |