Private companies and governments agencies all around the word make huge investments for the automation of their processes and in the management of the electronic documentation. The main requirement in the management of digital documentation is its equivalence, from a legal perspective, to paperwork, affixing a signature on a digital document is the fundamental principle […]
The US Government is very close to the theme of warfare being among the countries that invest more in the field. In a cyber security context we can enumerate a huge quantity of cyber threats that daily are designed and enhanced, a heterogeneous world and that includes many different options that could harm military and […]
Symantec company recently has disclosed the news that the collective Anonymous has deceived his supporters favoring the spread and installing of Zeus malware on their machines. The charge is heavy and would undermine the trust that underpins the recruitment methods of the collective, it seems that all supporters who have participated to various Distributed Denial of Service (DDoS) […]
After the attacks against certification authorities such as VeriSign, Comodo and DigiNotar the level of confidence in the model based on certificates is in sharp decline. There is widespread accusations addressed to the PKI paradigm (public key infrastructure ) which is based on the concept to request to trusted and credited third parties to guarantee […]
In these hours on the web is turning the news of a cyber attack performed by a group of Chinese hackers against some U.S. Government Agencies. Once again, the weapon used against the strategic objectives is a cyber weapon, in particular it has been used a new version of the trojan Sykipot. Chinese hackers have […]
It’s end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what else will we remember of this 2011? No doubts, we will remember the new way to use Internet, an irreplaceable vector for social protests, expression of social malaise and of too much stolen liberty. We […]
2011 was a terrible year for the certification authorities, the number of successful attacks against some major companies reported is really high and totally out of any prediction. Many attacks have had disturbing consequences.It all began, or so we were led to believe, with the case Comodo. Comodo officials revealed that the registration authority had […]
In this article I intend to read with you an interesting document, distributed by Imperva, in which they emphasized, the main threats that could cause significant problems in the coming year. Please carefully read the entire article, first we discuss the nine threats that worry Imperva, then I will introduce the most dangerous threats from my point of view. Do not spend days where you do not hear of cyber threats, risks and possible defense strategies implemented. Governments but […]
Have you ever wondered what are the main threats have concerns the banks and financial institutions? Several survey have been conducted and apart small differenced of on numbers they all have evidenced that Top fraud threats are payment card fraud check fraud phishing/vishing account takeover third-party POS skimming When these frauds are detected? The major […]
Are you able to imagine a world in which everybody is free to communicate without being intercepted, spied on, tracked? Have you ever dreamt, reading sad and bad news pages on the censure of many governments, a world where the concept of freedom of thought has been materialized? In recent decades we have witnessed radical […]