Cyber Crime

Duqu – The worst may still have to come for critical infrastructures

Duqu, a name that we are reading since several months and with whom we have called a malware that scares…

14 years ago

SCADA and vulnerabilities to critical infrastructures

Over the last few months there have been different events that led to the story than they can be dangerous…

14 years ago

Software piracy,from statistics to hypotheses of cyber warfare

With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether…

14 years ago

The year of the networked protest, from SOPA act to Anonymous

It's end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what…

14 years ago

2011, CAs are under attack. Why steal a certificate?

2011 was a terrible year for the certification authorities, the number of successful attacks against some major companies reported is…

14 years ago

Carrier IQ, the privacy of millions of users has been violated

In recent weeks we have learned of a dialer able to track our movements, spy on our communications, read our…

14 years ago

From the mosaic theory to the stuxnet case

With the term of Mosaic theory we refer the method used in security analysis to gather information about a corporation.…

14 years ago

India The blurred line between defense and cyber censorship

In this article I wish to bring to your attention what I regard as gross contradiction of a nation whose…

14 years ago

“Need an expert in customized botnet.” … new recruiting channel.

In recent weeks we have discussed a lot about cyber crime and how it is assuming frightening proportions. A growing…

14 years ago

Banking – new threats grow

Have you ever wondered what are the main threats have concerns the banks and financial institutions? Several survey have been…

14 years ago

This website uses cookies.