Dentro Anonymous. Viaggio nelle legioni dei cyberattivisti (Italian Edition)

Amazon Price: N/A (as of October 17, 2017 06:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cosa è successo al movimento di hacktivisti dopo l'ondata di arresti internazionali di alcuni mesi fa? Come si organizza? Quali sono i suoi strumenti? Come sono state effettuate alcune delle azioni più famose, compiute in Italia e all'estero? E perché?

Tra testimonianze dirette, decine di interviste, retroscena mai usciti, questa inchiesta sul campo ricostruisce gli ultimi sviluppi di Anonymous, il gruppo di cyberattivisti che ha dichiarato guerra a governi e aziende di mezzo mondo mostrando l'influenza morale di Julian Assange e il suo rapporto con WikiLeaks.
Continue reading “Dentro Anonymous. Viaggio nelle legioni dei cyberattivisti (Italian Edition)”

Mini Gadgets Inc Windows Breaker: Password Cracking Utility

Amazon Price: N/A (as of October 17, 2017 02:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Currently unavailable

Break Windows passwords on up to 10 PCs with ease

Understanding Cyber-Warfare: Politics, Policy and Strategy

Rating: 
Amazon Price: $44.95 $44.95 (as of October 17, 2017 07:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This textbook offers an accessible introduction to the emerging subfield of cyber warfare.

The international relations, policy, doctrine, strategy, and operational issues associated with computer attack, computer exploitation, and computer defense are collectively referred to as cyber warfare. This new textbook provides students with a comprehensive perspective from both a technical and a policy perspective conducted by both state and non-state actors.
Continue reading “Understanding Cyber-Warfare: Politics, Policy and Strategy”

Chinese Cyber Warfare: China’s Cyber Incursions, Strategic Method, Information Warfare Threat – Mandiant Report, Unit 61398, Henry Kissinger, Quantum Computing

Rating: 
Amazon Price: N/A (as of October 17, 2017 07:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

China's Cyber Incursions: A Theoretical Look at What They See and Why They Do It Based on a Different Strategic Method of Thought – This 2013 paper discusses the strategy behind China's cyber activities. The paper examines the Chinese concept of strategy and how it motivates China's cyber actions. These actions take the form of reconnaissance and system sabotage concepts that result in the fulfillment of strategy and in the development of a preemptive and offensive information deterrence disposition. The paper then examines China's response to the recent Mandiant security firm's report that accused the People's Liberation Army of compliance in attacking 115 US companies since 2006. China's next generation of quantum communications research is briefly discussed as well. The conclusions list the author's opinion regarding how to handle the Chinese in the future, through confrontation or dialogue, based on their thought process. This author argues for interceding into Chinese strategic concepts and changing the objective basis behind their cyber activities. China's invasive cyber activities make perfect sense—to them. Through extensive reconnaissance activities, China gains leverage in three areas: its ability to establish a cyber strategic advantageous posture over potential opponents; its ability to identify key nodes in an opponent's network and gain the potential ability to conduct system sabotage against them if necessary; and its ability to develop a cyber deterrence concept of Chinese-make through the construction of a new type of "show of force," such as the identification and revelation of a potential opponent's cyber geography that deters an opponent from acting. Cyber espionage activities are activated due to a specific strategic thought process and resulting paradigm that subsequently uncovers strategic opportunities.

Chinese Information Warfare: A Phantom Menace or Emerging Threat? Mao Tse-tung counseled, "To achieve victory we must as far as possible make the enemy blind and deaf by sealing his eyes and ears, and drive his commanders to distraction by creating confusion in their minds." Few concepts mesh so contextually with Mao than the Chinese approach to Information Warfare (IW). As the People's Republic of China struggles with its national military strategy, IW offers opportunities to win wars without the traditional clash of arms.
Continue reading “Chinese Cyber Warfare: China's Cyber Incursions, Strategic Method, Information Warfare Threat – Mandiant Report, Unit 61398, Henry Kissinger, Quantum Computing”

CyberStorm

Rating: 
Amazon Price: $12.99 $12.09 You save: $0.90 (7%). (as of October 17, 2017 06:48 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Sometimes the worst storms aren't from Mother Nature, and sometimes the worst nightmares aren't the ones in our heads. Mike Mitchell, an average New Yorker already struggling to keep his family together, suddenly finds himself fighting just to keep them alive when an increasingly bizarre string of disasters start appearing on the world's news networks. As the world and cyberworld come crashing down, bending perception and reality, a monster snowstorm cuts New York off from the world, turning it into a wintry tomb where nothing is what it seems…

"As a member of the Military that does 'cyber' for his job, it's refreshing to finally see a novel that shows how dangerous our transition to an interconnected infrastructure will become without proper safeguards…I couldn't put down!" – Karic Allegra, Joint Interoperability Command, US NAVY
Continue reading “CyberStorm”