Sicurezza delle Infrastrutture IT
  • January 7, 2014

    US Defense Budget to Both Regulate and Proliferate Cyber Weapons

    US Defense Budget to Both Regulate and Proliferate Cyber Weapons: The National Defense Authorization Act for Fiscal Year 2014 approved by Congress seeks to regulate the proliferation of cyber weapons while simultaneously providing bigger budgets for the military to develop more sophisticated cyber attack capabilities. The intention of the Cyber Security Initiative is to both […]

  • January 7, 2014

    Snapchat CEO Interview On Security Hole

    Snapchat CEO Interview On Security Hole: Snapchat’s CEO Evan Spiegel appeared on the Today Show this morning to discuss the recent security breach that caused about 4.6 million usernames and phone numbers to be leaked publicly online on New Year’s Eve. Snapchat released a statement Thursday night explaining how the hack happened, but failed to […]

  • January 7, 2014

    NSA Elite Hacking Team Operations Exposed

    NSA Elite Hacking Team Operations Exposed: It should come as no surprise that the National Security Agency has a special team of top-gun hackers who breaks into systems around the world to spy on its targets. But revelations published yesterday by a German magazine about the NSA’s Tailored Access Operations (TAO) Group and the agency’s […]

  • January 7, 2014

    Swiped: 5 lessons from the Target card breach

    Swiped: 5 lessons from the Target card breach: The theft of 40 million credit and debit card records from Target (TGT) wasn’t the biggest or most damaging data breach ever, but coming right before Christmas, it sure did get our attention-and maybe that’s good. Perhaps American consumers needed a slap in the face to focus […]

  • January 6, 2014

    Top 10 Security Breaches Of 2013

    Top 10 Security Breaches Of 2013: In 2013, hackers developed new methods to bypass security restrictions. They unleashed powerful denial-of-service attacks that mimic legitimate traffic better than ever before. They created new malware strains that easily bypass traditional security defenses. They honed their social engineering tactics, designing ever more believable phishing attacks to steal their […]

  • January 6, 2014

    US Appeals Court Ruling Invalidating NSA Surveillance

    US Appeals Court Ruling Invalidating NSA Surveillance: WASHINGTON – The US government said Friday it is appealing a judge’s ruling that the National Security Agency’s bulk collection of phone records is unconstitutional and “almost Orwellian.” The Justice Department filed a notice of appeal with the court following last month’s ruling by Judge Richard Leon. Arguments […]

  • January 6, 2014

    NATO has constituted Cyber Response Teams

    NATO has constituted Cyber Response Teams: NATO is establishing its reaction units to protect its infrastructure in case of cyber attacks, the organization will set-up exactly two teams for the purpose. NATO is considered a privileged target for hackers, in 2012 it suffered  2,500 “significant cases” of cyber attacks against its networks, during the 2013 […]

  • January 6, 2014

    5 Biggest Cyber Threats to Watch for in 2014

    5 Biggest Cyber Threats to Watch for in 2014: Here’s what to watch out for in the coming year: 1. Mobile malware We’re all familiar with malware on PCs, but according to McAfee Labs, growth in PC malware was largely flat during 2013. However, malware in Android mobile operating systems grew by 33 percent. McAfee […]

  • January 4, 2014

    Security Guard. Tips and Tricks for Windows 7 Protection

    Security Guard. Tips and Tricks for Windows 7 Protection: Using BitLockerBitLocker is one of the most popular and improved securities in Win 7. This hard disk and encryption technology and protecting the integrity of the boot medium first appeared in Windows Vista. We can find BitLocker in several Ultimate and Enterprise edition of Win 7. […]

  • January 3, 2014

    NSA Server vulnerable to SMTP Spoofing, can be used for Social Engineering

    NSA Server vulnerable to SMTP Spoofing, can be used for Social Engineering: An Indian hacker known as “Godzilla” has identified a vulnerability in the NSA website that allows an attacker to send fake emails from NSAs SMTP server. NSAs SMTP server allows anyone to use the service without verifying the IP address and password.  The […]

Categories

  • Hacks and Incidents
  • Security News
  • Security Techniques
  • Uncategorized

Copyright © 2025 by ISGroup SRL - All Rights Reserved