Security

Analyzing CIA Director BRENNAN’s talk at Council on Foreign Relations (CFR)Analyzing CIA Director BRENNAN’s talk at Council on Foreign Relations (CFR)

Analyzing CIA Director BRENNAN’s talk at Council on Foreign Relations (CFR)

We bring to the attention of the Security Affairs readers the interesting speech and interview dated 29/06/2016 of CIA Director…

9 years ago
A close look at the Italian Cybersecurity National FrameworkA close look at the Italian Cybersecurity National Framework

A close look at the Italian Cybersecurity National Framework

The Italian model with regard to issues of cyber security and intelligence is in the process of evolution through a…

9 years ago
Snowden and Bunnies devised the Introspection Engine to avoid surveillanceSnowden and Bunnies devised the Introspection Engine to avoid surveillance

Snowden and Bunnies devised the Introspection Engine to avoid surveillance

The NSA whistleblower Edward Snowden and the popular hacker Andrew “Bunnie” Huang designed Introspection Engine, an interesting anti-surveillance device. While…

9 years ago
Many enterprise apps affected by flaws in Oracle OIT librariesMany enterprise apps affected by flaws in Oracle OIT libraries

Many enterprise apps affected by flaws in Oracle OIT libraries

18 out of 276 vulnerabilities fixed by Oracle with the last Patch Update resides in the OIT libraries that are…

9 years ago
OpenSSH is affected by a user enumeration bugOpenSSH is affected by a user enumeration bug

OpenSSH is affected by a user enumeration bug

The popular OpenSSH is affected by a user enumeration bug that could be exploited by a remote attacker to check…

9 years ago
Robocop is (almost) here : Artificial Intelligence in your Security TeamRobocop is (almost) here : Artificial Intelligence in your Security Team

Robocop is (almost) here : Artificial Intelligence in your Security Team

DARPA organized a challenge where 7 finalists will battle it out with the Artificial Intelligence system to detect flaws and…

9 years ago
The EU passed the NIS directive, its first ever cyber security rulesThe EU passed the NIS directive, its first ever cyber security rules

The EU passed the NIS directive, its first ever cyber security rules

The EU has passed the new NIS directive that establishes minimum requirements for cyber-security on critical infrastructure operators. The European…

9 years ago
Government wiretaps – You can’t stop what you can’t seeGovernment wiretaps – You can’t stop what you can’t see

Government wiretaps – You can’t stop what you can’t see

Report on wiretaps in 2015 suggests Americans are using less encryption to hide their activities online, is it really true.…

9 years ago
WhatsApp vs Telegram in Terms of Encryption and FeaturesWhatsApp vs Telegram in Terms of Encryption and Features

WhatsApp vs Telegram in Terms of Encryption and Features

Compare and contrast WhatsApp and Telegram, so as to see which of the two messaging apps offers the best option…

9 years ago
ThinkPwn UEFI Zero-Day flaw allows hackers to disable security featuresThinkPwn UEFI Zero-Day flaw allows hackers to disable security features

ThinkPwn UEFI Zero-Day flaw allows hackers to disable security features

The researcher Dmytro Oleksiuk published details of ThinkPwn flaw, a UEFI zero-day that could be exploited by hackers to disable…

9 years ago