This site collects anonymous statistical data on navigation through cookies installed by authorized third parties, respecting privacy of your personal data and in accordance with standards established by law. By continuing to browse this site, clicking on links in it or simply shaking the page down, you agree to the service and the same cookie.

A+ A A-

Hacking Team and collateral damage

Sunday, 02 August 2015 23:54

In Italy, the citizens, have no real perception of what happened with the violation of the computer systems of a private company that provides "services" in many countries. If he had spoken for example, a company that dealt with unwinding of data from cameras, on behalf of a municipal police, maybe it would be all hell broke loose, "there is a penalty for data processed by persons who have not the qualification of PG ", etc.

This is about (according to what we can read on-line) control devices that are not only computers but also smartphone or tablet. Check is not just observe or acquire it also means blocking, use, write, erase and then act on behalf of the user! Imagine if someone could deposit files whose detention is prohibited and prosecuted by law such as child abuse images ... or if you think the device of the subject X involved in proceedings, infected with this malware until a month ago to the unknown Most software, was polluted with material overwhelming.

Published in Italy

Geoeconomia

Eversione e Terrorismo

Geopolitica

Risorse Energetiche

Cyber Warfare

Copyright CEOS 2012 - 2015. All rights reserved.