Cyber Crime

WiFi Protected Setup vulnerable to Reaver tool attack

Wi-Fi Protected Setup (WPS; originally Wi-Fi Simple Config) is a computing standard used to allow easy establishment of a secure…

14 years ago

Stuxnet, Duqu and the sons of the “Tilded” platform

We all have heard of Stuxnet viruses, malware that has undoubtedly marked a new era in the field. It is…

14 years ago

GSM mobile … the insecure network

The latest discovered vulnerability in GSM ( Global System for Mobile) technology is worrying many telecom operators of several countries due…

14 years ago

Iran, the cyber threat … are we creating a new enemy ?

"Iran, the super power capable of threatening the world". This is the title of a hypothetical sensationalist article aimed to…

14 years ago

Russia, cyber repression in the social networks era

Several times in these posts we have discussed of the importance of social media in recent years. Social Media are…

14 years ago

Malware attacks Georgia Hospital, have we learnt the lesson?

The medical industry is historically one of the sectors that has benefited more than others for the introduction of technology.…

14 years ago

Duqu – The worst may still have to come for critical infrastructures

Duqu, a name that we are reading since several months and with whom we have called a malware that scares…

14 years ago

SCADA and vulnerabilities to critical infrastructures

Over the last few months there have been different events that led to the story than they can be dangerous…

14 years ago

Software piracy,from statistics to hypotheses of cyber warfare

With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether…

14 years ago

The year of the networked protest, from SOPA act to Anonymous

It's end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what…

14 years ago

This website uses cookies.