Cyber arms race, too many shadows on the future
The Mehr News Agency has published a declaration of brigadier general Gholamreza Jalali collected during an official conference that demonstrate the high interest in warfare of Iran. “The US is...
View ArticleOSINT research to discovery lucrative business of monitoring systems
The dramatic events of recent months have occurred in Syria should lead us all in deep thought. What value do we place on human life? Are we really willing to sacrifice the life of a child for money?...
View ArticleThe Facebook engagement in the fight against botnets with FBI
Social networks are platforms that have monopolized majority of user’s internet experience, the imperative is to “social”, and everybody share an incredible amount of personal information exposing its...
View ArticleNSA published a book on Intelligence through Google for its cyber spies
Google is a mine of information that could be used for various purposes, for this reason National Security Agency realized a book to help its spies uncover intelligence hiding on the web. Few days ago...
View ArticleUS Air Force notice on military use of social media
US Air Force published a notice that includes a paragraph on the use of social media platforms for computer network exploitation. In the recent months I had the opportunity to conduct an interesting...
View ArticlePRISM repercussion on the Tor network accesses
The article proposes the analysis of the impact on the use of the Tor network after the events related to PRISM surveillance program disclosure. The use of Tor Network to preserve user’s anonymity and...
View ArticleFacebook FBStalker tool uses Graph Search for powerful OSINT analysis
Experts Werrett and Lee demonstrated how to conduct a powerful analysis using FBStalker, a tool created to find a comprehensive amount of data on any Facebook user. Facebook, and more in general social...
View ArticleBusiness Intelligence – Intro to reconnaissance
Exploring the Business Intelligence module proposed by the online course of the Hacker Academy – Intro to reconnaissance phase for a penetration testing. One of the most important components of the...
View ArticlePossible evolution of the dispute between Russia and Ukraine
Intelligence Analysts analyzing signals from the cyberspace have tried to predict the evolution of the dispute between Ukraine and Russia. The correlation of the events in the reality with ongoing...
View ArticleGCHQ presents CyberChef, an Open Source Data Analysis Tool
The GCHQ has released the code of a new open source web tool dubbed CyberChef, specifically designed for analyzing and decoding data. Open data are a privileged source for intelligence agencies, almost...
View Article
More Pages to Explore .....