Security

CleanIT project, concerns for a global surveillance project

I'm just returned from the Cyber Threat Summit in Dublin, one of the most interesting European events in cyber security…

13 years ago

Buying Time with Cloud-based Server Monitoring Solutions

System administrators are extremely busy people, so they will be very pleased to know that cloud-based server monitoring solutions can…

13 years ago

Analisys on Flame C&C, the cyber war began long ago

In May Iranian Computer Emergency Response Team Coordination CenterLab,  CrySyS Lab and Kaspersky Lab have published a news regarding a…

13 years ago

State-sponsored attack or not, that’s the question

The defense of cyberspace is becoming one the most concerning question to approach, governments all around the world are massively…

13 years ago

The good and the bad of the Deep Web

  Article Published on The Hacker New Magazine – September Edition “Security in a serious way” Introduction The Deep Web (or…

13 years ago

Pierluigi Paganini at Cyber Threat Summit 2012

Cyber Threat Summit 2012 - 20th & 21th Dublin   Pierluigi Paganini presents "The rise of cyber weapons and relative…

13 years ago

Microsoft distrupts Nitol botnet, malware hidden in supply chain

The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or…

13 years ago

Botnet, pro & cons of using Tor Networks

As declared several time Deep Web, thanks to the anonymity of its connection, provides to cyber criminals an ideal environment…

13 years ago

Cybercrime evolution in North America and Western Europe

Despite cyber space is known as a domain without border an interesting study of the Kaspersky Security firm demonstrates that…

13 years ago

All you have to know on DDoS attack against GoDaddy

Yesterday was a terrible day, late afternoon in Europe Time, I noted that my blog Security Affairs, was down. I…

13 years ago

This website uses cookies.