Security

ICS-CERT Surge In attacks against Energy Industry

The ICS-CERT issued a new Monitor report that revealed a surge of brute force attacks against control systems mainly belonging…

13 years ago

Two-factor Authentication for SMBs

The purpose of this article is to cover the challenges SMBs are facing when it comes to using authentication methods…

13 years ago

Android botnets on the rise – case study

Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and…

13 years ago

The Security State of WordPress’ Top 50 Plugins

Checkmarx’s report analyzed the security of the top 50 most popular plugins (in general), as well as the top 10…

13 years ago

Stellar Wind, Prism,EvilOlive,ShellTrumpet, US massive surveillance

Stellar Wind, Prism,EvilOlive, ShellTrumpet are the names of some of the US massive surveillance programs revealed recently by the press…

13 years ago

Comment Crew, China-based group of hackers is changing tactics

Chinese hackers Comment Crew is changing tactics, security firms suspected it due the analysis of principal cyber espionage campaigns targeted…

13 years ago

Car hacking, cinematographic fiction or reality

Car hacking is today possible due the massive introduction of technology in our vehicles, a hacker that gain access to…

13 years ago

Attacks-as-a-Service, MaaS, FaaS different terms same success history

Attacks-as-a-Service, Malware-as-a-Service and Fraud-as-a-Service, are all terms used to better qualify the complex evolution of cybercrime offer. Attacks-as-a-Service , Malware-as-a-Service and Fraud-as-a-Service are all terms commonly used for…

13 years ago

Anonymous and state-sponsored hackers threaten energy sector

The energy sector is threaten with increasing frequency by hacktivists, state-sponsored hackers and cybercriminals... The number of cyber attacks against energy…

13 years ago

Operation Tempora, massive tapping program conducted by Britain’s GCHQ

Operation Tempora, is the name of GCHQ program to tap fibre-optic cables for secret access to communications. Operation Tempora, this is…

13 years ago

This website uses cookies.