Security

Cyber security at large sporting events

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, David Pace The London 2012 Olympics will bring together 10,500…

14 years ago

The importance of security requirements in design of SCADA systems

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 06 2012 The article exposes the main issues…

14 years ago

All the truth about Yahoo Contributor Network data breach

It's hacking time! Within a few days we saw two attacks that had disastrous consequences, the victims are prominent Formspring…

14 years ago

The raise of Multi-platform malware

The malware factory still evolving, every day security firms detect new cyber threats that show new sophisticated techniques to avoid…

14 years ago

Anonymous #OpPedoChat pros and cons of a noble battle

The hacktivists of Anonymous are always on and always operating despite many experts continue to downplay the importance and effectiveness…

14 years ago

Syria Files, Wikileaks, Anonymous and dirty affairs

Big outcry on Wikileaks that last week has published more that 2.4 million emails allegedly obtained from continuous hack against…

14 years ago

Cyberoam DPI vulnerability scares Tor

Last week, on blog.torproject.org was published the news relative to a security vulnerability found in Cyberoam DPI devices (CVE-2012-3372). All…

14 years ago

ICS-CERT report, a worrying increase of cyber attacks

It's been long debated the need to protect critical infrastructures from cyber attacks, cyber threats could hit foreign countries causing…

14 years ago

DNSChanger, July 9th is arrived!

The story begins in November 2011 when in Estonia was arrested a group of persons accused of having developed the…

14 years ago

A view on the economic impact of cyber attacks, from US to China

On June 28th, a FBI official declared before a House panel that the phenomenon of cyber espionage is increasing with…

14 years ago

This website uses cookies.