Adoption of a two-factor authentication process is necessary  to increase the robustness for authentication processes, but security is a process that must be cured at 360 degrees. Twitter finally deployed two-factor authentication to improve security of a userâs account, this is the response of popular social network to the various incidents occurred to some of […]
The author Tim Shorrock revealed that the US spy system ThinThread was tested on the unsuspecting population of New Zealand from 2000 to 2001 ThinThread is the name of a project that the National Security Agency conducted during the 1990s, the program was focused on sophisticated techniques for wiretapping and intelligence analysis. The program was discontinued after […]
New cyber attacks from Iran hit US enterprises focusing on energy sector, the offensive has been revealed by American officials and private security experts. A new series of cyber attacks from Iran hit US enterprises, the offensive has been revealed by American officials and private security experts. The attacks are classified as âpotentially destructiveâ and targeted IT […]
German researchers revealed that Microsoft is able to intercept Skype conversation for security reason. Which are risks to the users’ privacy? Microsoft intercept Skype conversations, the topic is at the center of a heated discussion. Before Microsoft acquisition the popular VOIP application was considered very secure and wiretap-proof, it was officially recognized that was impossible […]
US Congressmen Ed Markey and Henry Waxman issued the report “Electric grid vulnerability” on the level of security for US critical infrastructure. Attack on critical infrastructure is the main concern for worldwide security community, every government has become aware of the risks related to a cyber attack against their own country and is investing to improve its cyber capabilities. […]
Chinese hackers who breached Google in 2010 are responsible for the recent violation to Google Companyâs Surveillance Database according officials revelations. Google data breach is reality and Google Companyâs Surveillance Database has been violated by the same hackers who breached Google’network in 2010, the attackers have obtained the access to the companyâs tracking system for […]
Governments, and in particular US one, are principal buyers of zero-day vulnerabilities according a report published by Reuters. Zero-days exploits are considered a primary ingredient for success of a cyber attack, the knowledge of zero-day flaw gives to the attacker guarantee of success, state-sponsored hackers and cyber criminals consider zero-day exploits a precious resources around […]
Operation Hangover is the title of a report published by Norman Shark that details a sophisticated cyberattack infrastructure that appears to originate from India, conducted by private threat actors with no evidence of state-sponsorship. Operation Hangover, this is the name assigned by Norman Shark’s security analyst team to an interesting report revealing a large and sophisticated cyber-attack […]
âSecuring Cyberspace in a borderless world: Vision 2015 and Beyondâ is the title of a High Level Dialogue that was held during The World Summit on the Information Society Forum (WSIS) 2013. The World Summit on the Information Society Forum (WSIS) represents the worldâs largest annual gathering of the ICT for development community, the event is organized […]
The popular security expert Nir Goldshlager found  a serious vulnerability that allows attackers to post spoofed messages from any application on Facebook. Facebook has many vulnerabilities exactly as any other software and daily hackers try to exploit them, the primary concerns of security experts are related to flaws in the popular social network that could all […]