January 2012 Cyber Attacks Timeline (Part 1)

Click here for part 2.

New year, new Cyber Attacks Timeline. Let us start our Information Security Travel in 2012 with the chart of the attacks occurred in the first fifteen days of January. This month has been characterized so far by the leak of Symantec Source Code and the strange story of alleged Cyber Espionage revolving around it. But this was not the only remarkable event: chronicles tell the endless Cyber-war between Israel and a Saudi Hacker (and more in general the Arab World), but also a revamped activity of the Anonymous against SOPA (with peak in Finland). The end of the month has also reserved several remarkable events (such as the breaches to T-Mobile and Zappos, the latter affecting potentially 24,000,000 of users). In general this has been a very active period. For 2012 this is only the beginning, and if a good beginning makes a good ending, there is little to be quiet…

Browse the chart and follows @paulsparrows to be updated on a biweekly basis. As usual after the jump you will find all the references. Feel free to report wrong/missing links or attacks.

(more…)

Continue Reading January 2012 Cyber Attacks Timeline (Part 1)

Mobile Warfare

  • Post author:
  • Post last modified:March 23, 2011
  • Post category:MobileSecurity
  • Post comments:13 Comments
  • Reading time:9 mins read

It has been recognized that mobile technologies have had a significant impact on the events that occurred in North Africa.…

Continue Reading Mobile Warfare

Non C’è Pace Per l’Androide

  • Post author:
  • Post last modified:January 30, 2011
  • Post category:Security
  • Post comments:3 Comments
  • Reading time:2 mins read

Non c'e' dubbio, le facili previsioni che davano l'Androide al centro dei problemi di sicurezza per il 2011 hanno centrato…

Continue Reading Non C’è Pace Per l’Androide