Security

Phishing the financial and banking seas

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martins, David Pace and Benjamin Gittins Every day the international…

14 years ago

Reuters blogging platform hacked, the critical role of information

In this day my blog has dedicated a great attention to the security of social media, explaining the importance of…

14 years ago

Facebook, more than 83 million questionable profiles.The poisoned networks

Crazy ... a year ago on a warm June evening I began to formalize some ideas on a concept of…

14 years ago

Malware & cyber espionage, ongoing attacks on sensitive information

Malware once were used primarily to destroy the victim's PC, but the scenario has completely changed today. While surviving the…

14 years ago

Governments are increasing cyber security on social media

Many experts are sure, the new horizons of intelligence are in the social media and in the ability to control…

14 years ago

Rakshasa, is it possible design the perfect hardware backdoor?

Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by…

14 years ago

South Korea, another data breach. How is changing the hacking world?

Browsing the internet is easy to find information regarding date breach by hackers against large companies that fail to protect…

14 years ago

Smart Phone Monitoring and Malware… Up close and personal…

Article published on The Malta Indipendent by Ron Kelson - Vice Chair ICT Gozo Malta Project, Pierluigi Paganini – Director and…

14 years ago

Anonymous #op_Australia, data breach and reflections on utopian privacy

This time target of attacks of the Anonymous group is the Australian government,  at least 10  websites were taken down…

14 years ago

Japan institutions victim of cyber espionage, is it cyber warfare?

One of the biggest cyber threat is cyber espionage, it's the sign of the technological era in which every devices…

14 years ago

This website uses cookies.