Threat Intelligence

PRISM – Facts, Doubts, Laws and Loopholes

Introduction Edward Snowden is the name of a 29-year-old technical assistant for the Central Intelligence Agency who disclosed the largest surveillance prog

GhostNet - Part II

Behind the GhostNet notion stands an entire international worldwide network of infected computers belonging to places having high political, economic, media,

GhostNet - Part I

Introduction Several years after the revelation of GhostNet, a massive case of cyber exploitation directed mostly against the Tibetan community, in terms of

TeamSpy, Miniduke, Red October, and Flame: Analyzing Principal Cyber Espionage Campaigns

Even a layman would notice that cyberspace is in full storm; different entities are increasing malicious activities pursuing various purposes, and cyber espi

Unit 61398: Chinese Cyber-Espionage and the Advanced Persistent Threat

In the world of computer security, the concept of an "Advanced Persistant Threat" has garnered a great deal of publicity recently. Commonly referred to by th

Diving in the deep web

“Deep Web”, also known as “hidden web”, is a term that evokes the unknown, a mysterious place in the cyber space populated by criminals and hackers that is n

Flame: The Never Ending Story

It is not possible to talk about cyber warfare and cyber weapons without mentioning the famous Stuxnet virus and the series of state-sponsored malware develo

Understanding the Origins of the China - Philippine Cyber War

For many years, there has been a territorial dispute between China and Philippines over the Scarborough Shoal (Philippine Term: Panatag Shoal) or Huangyan Is

Mexican Drug Cartels and Cyberspace: Opportunity and Threat

1) Mexican Drug Gangs Kidnap Computer Hackers and Programmers Mexican drug trafficking organizations are increasingly demonstrating a desire to make money f