Cyber warfare expert John Bumgarner claims that the Stuxnet and Duqu virus have been active for much longer than previously…
During this days I had the opportunity to read the results of a couple of surveys: The PricewaterhouseCoopers (PwC).…
Let we use these ingredients to start some serious reflection on safety issues related to mobile devices: Robust growth in…
Are we able to ensure that every peripherals connected to our computers and present in our offices is proof of attack? The first answer will be ... “sure”. We observe same problem with…
The control of information is the main concern of Governments. More or less declared the major players of a precarious global economy have implemented digital surveillance systems, from India to China, passing Russia and…
It is clear that the question awaits an answer deterministic, but an assessment of the main factors that influence the "final expense". My idea is to understand what is the magnitude of…
The SCADA systems at the Water utilities in Illinois were hacked by a malicious attacker. “the SCADA system was powered…
Last week I had the opportunity to discuss with my father of adverse economic situation and in particular of the…
What is purpose for DNS cache poisoning attacks? DNS cache poisoning is an attack methodology used to compromise in the…
In a few days we have heard of a couple of satellite attacks by hackers meanwhile surfing on the web…
This website uses cookies.