Security

F-Secure Mobile threat report Q3/2012, cyber threats in the ether

F-Secure  security firm has recently published the “Mobile threat report Q3/2012” related the past quarter that presents the mobile threat…

13 years ago

Attack of Team GhostShell against Russian Government

Last month we have discussed on the attacks conducted by the group of hackers Team GhostShell against universities all over the…

13 years ago

The big, fake, Anonymous ransomware

Do you remember the case of the Anonymous OS proposed during last months? Who developed that OS and why? Difficult…

13 years ago

Russia deploys a massive surveillance network system

Last year I wrote about a new powerful surveillance system that Russian government committed to private business to implement a…

13 years ago

Please can you explain what it is and how does the bitcoin work?

After the publishing of the book "Deep Dark Web" many colleagues asked me to explain how does work the finance…

13 years ago

Is it really so simple crack your password?

The numerous attacks and data breaches occurred during the last 12 months demonstrated that despite high attentions in security the…

13 years ago

Cyber security landscape in Africa

Let me present you a very interesting study on cyber security landscape in Africa, conducted by IDG Connect, division of International…

13 years ago

#AntiSecIT Analysis of the Anonymous Italian job

Last week I discussed with a friend on the risks related to attacks of the group Anonymous against strategic offices…

13 years ago

Trend Micro Q3 security report

Trend Micro has released the report "3Q 2012 SECURITY ROUNDUP -Android Under Siege: Popularity Comes at a Price" that presents…

13 years ago

UK recruits “Xbox generation” youngsters for cyber war games

The future is now, I've often spoken about the enormous potentiality of gaming platforms and of the capabilities of young…

13 years ago

This website uses cookies.