Security

Cyberespionage, another watering hole attack against US website

It’s Christmas time everywhere but cyberspace there isn’t holiday time for governments, last week a new cyber espionage attack has…

13 years ago

Hacktivism and web monitoring in 2013 for Security Affairs

The year is ending and it’s very easy to read forecast for next year, experts are sure that we will…

13 years ago

TheAndroid.DDoS.1.origin, a new malware detected on Android mobile

In line with expectations a new cyber threat is menacing the mobile, in particular the most diffused OS, Android. The…

13 years ago

DoJ wants to indict state-sponsored hackers. What is the real purpose?

The last couple of years has been characterized by the raise of state-sponsored cyber attacks, governments have increased cyber capabilities…

13 years ago

9 Steps to Cybersecurity

                        During this week I had the opportunity to…

13 years ago

The “company” cybercrime seen by Fortinet

Fortinet company, the worldwide provider of network security appliances and a market leader in unified threat management (UTM), has recently…

13 years ago

Perfect Citizen, US vulnerability assessment program on critical infrastructures

CNET web site has published a news on a secret National Security Agency program named Perfect Citizen that is targeting…

13 years ago

Have you been hacked? … you must disclose it!

During 2009 it was revealed that one of the primary defense contractor BAE Systems was hacked causing the exposure of…

13 years ago

Accessing to PGP, TrueCrypt, and BitLocker encrypted containers with a £300 tool

The news was a bolt from the blue, the confidentiality of our data is at risk, Russian company Elcomsoft has…

13 years ago

US develop exploitation methods for mobile devices while refuse UN treaty

Just one week ago a UN treaty was approved to update 24-year-old United Nations telecommunications rules. The agreement states that…

13 years ago

This website uses cookies.