Laws and regulations

Cyber warfare – Why we need to define a model of conflict?

Cyber warfare or information warfare is still a gray area of the military doctrine, it is necessary to define the…

10 years ago

US government released draft for NIST cybersecurity framework

NIST released the draft of cybersecurity framework, which outlines how private companies can protect themselves against cyberattacks, and security breaches.…

11 years ago

Proxy.sh – Can you trust your VPN provider? Maybe …

Proxy.sh VPN service with no-logging policy announced to have sniffed the traffic of US based server to Catch Hackers. Can…

11 years ago

Goolge has access to WiFi passwords stored in Android mobile devices

Google might have the access to WiFi passwords of customers stored in Android mobile devices due a built-in feature in…

11 years ago

FBI admitted attack against the Freedom Hosting

In an Irish court the FBI Supervisory Special Agent Donahue revealed that FBI had control of the Freedom Hosting company…

11 years ago

Megaupload files deleted by LeaseWeb

Megaupload files have been deleted by Dutch hosting provider LeaseWeb,  in the post a resume of the facts and fantastic…

11 years ago

Liberty Reserve suspension and impact on criminal underground

Private currency exchange system Liberty Reserve was shut down by US law enforcement, it is considered most popular payment system…

11 years ago

Apple decrypts seized iPhones for law enforcement

Apple can "bypass the security software" if it chooses, accoring ATF no law enforcement agency could unlock a defendant's iPhone except…

11 years ago

Cyber security bill CISPA is passed

A nightmare come true, last Thursday The United States House of Representatives approved the debated cyber security bill,  the act…

11 years ago

The Legislation of Privacy: New Laws That Will Change Your Life

Today I desire to present the excellent work produced by freelance writer Gillian Holmes and the team of BackgroundCheck.org, as…

11 years ago

This website uses cookies.