The medical industry is historically one of the sectors that has benefited more than others for the introduction of technology. Devices allow ever more complex operations every day to millions of patients and to medical equipments, from health conditions monitoring to remote surgery. Informations systems manage massive amounts of sensitive information, making them available to […]
During the last year we have seen the consolidation of the tendency to use social media as a major vector for the exchange of information. The imperative is to be social, no matter if you need to share photos with friends or to express an opinion on a topic of social interest. Over the past […]
Duqu, a name that we are reading since several months and with whom we have called a malware that scares the scientific community for some features we will shortly describe. I wrote a lot in this blog about Duqu and on more than one occasion we have raised doubts about the genesis of the agent. […]
Over the last few months there have been different events that led to the story than they can be dangerous attacks on SCADA systems used to control production processes in industrial plants of various kinds, from industrial production to the provision of electricity supply or water. The concern is high, it could materialize the nightmare […]
With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether software piracy is deliberate or not, it is still illegal and punishable by law. We distinguish several type of software privacy: End user: sing one licensed copy to install a program on multiple computers,copying distrubuting […]
It’s end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what else will we remember of this 2011? No doubts, we will remember the new way to use Internet, an irreplaceable vector for social protests, expression of social malaise and of too much stolen liberty. We […]
2011 was a terrible year for the certification authorities, the number of successful attacks against some major companies reported is really high and totally out of any prediction. Many attacks have had disturbing consequences.It all began, or so we were led to believe, with the case Comodo. Comodo officials revealed that the registration authority had […]
In recent weeks we have learned of a dialer able to track our movements, spy on our communications, read our SMS … the privacy of millions of users has been violated! A disturbing application, multi-platform, which had not been reported previously. The news is troubling because it puts into serious consideration the privacy rights of […]
With the term of Mosaic theory we refer the method used in security analysis to gather information about a corporation. A natural extension of the method hit its application to ordinary life. Mosaic theory involves collecting information from different sources, public and private, to calculate the value of security. The key concept is the collection and […]
In this article I wish to bring to your attention what I regard as gross contradiction of a nation whose people I admire for their professionalism and dedication to work, India. In my previous article “Cyber India” lights and shadows of the country full of contradictions I presented a picture of the nation in terms of cyberwarfare, […]