Crypto

Sykipot attacks U.S PKI infrastructures based on smart cards

In these hours on the web is turning the news of a cyber attack performed by a group of Chinese…

14 years ago

The year of the networked protest, from SOPA act to Anonymous

It's end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what…

14 years ago

2011, CAs are under attack. Why steal a certificate?

2011 was a terrible year for the certification authorities, the number of successful attacks against some major companies reported is…

14 years ago

Top Nine cyber security trends for 2012? They are too few, isn’t it?

In this article I intend to read with you an interesting document, distributed by Imperva, in which they emphasized, the main threats that could cause significant problems in the coming year.  Please…

14 years ago

Banking – new threats grow

Have you ever wondered what are the main threats have concerns the banks and financial institutions? Several survey have been…

14 years ago

The utopian privacy

Are you able to imagine a world in which everybody is free to communicate without being intercepted, spied on, tracked?…

14 years ago

Cybercrime, an industry that knows no crisis

  During this days I had the opportunity to read the results of a couple of surveys: The PricewaterhouseCoopers (PwC).…

14 years ago

Social Network Poisoning … they want to spy on us, we evade

Social Network Poisoning term refers the effect produced by the application of methods designed to make unreliable the knowledge related…

14 years ago

Assange, Spy Files and uncomfortable truths

If we talk about security which could be our worst nightmare? My answer is "to be vulnerable in every moment…

14 years ago

“Mobile” intrigue … A prying eyes to carry around …

Let we use these ingredients to start some serious reflection on safety issues related to mobile devices: Robust growth in…

14 years ago

This website uses cookies.