Security

A view on the economic impact of cyber attacks, from US to China

On June 28th, a FBI official declared before a House panel that the phenomenon of cyber espionage is increasing with…

14 years ago

Who really takes advantage of the operations of Anonymous?

I desire to tribute another article to the group that catch the  worldwide attention of security community, Anonymous. Few years…

14 years ago

Citadel trojan, migration of cybercrime to the deep web

We all remember the Citadel trojan, based on  the Zeus experience has evolved becoming one of the most interesting cyber…

14 years ago

Hacktivism and Deep Web

  In today's society technology plays a crucial role and is used as a new cultural vehicle, and even aggregation…

14 years ago

Drones vulnerable to hijacking, concerns on security and privacy

Last week a saw a satellite image taken by Google Earth related to a mysterious vehicle, apparently an unmanned aerial…

14 years ago

Are your business operations secure?

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, David Pace, Ben Gittins Today, the chief executive officers (CEOs) of…

14 years ago

Dalai Lama + Mac OS X = APT with Tibet malware

Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used…

14 years ago

Stratfor refunds clients.Concerns on subcontractors in the security chain

Last Christmas the Stratfor Global Intelligence was hacked by Anonymous who disclosed company website and also the full client list…

14 years ago

RSA SecurIDs Cracked In 13 Minutes,rumors and denials

The news has creating great surprise in the security community, a group of computer scientist has declared that has cracked…

14 years ago

#opJapan, Anonymous against Japan and its war to piracy

A couple of days ago a read about a new amendment to copyright laws passed in Japan last week. The…

14 years ago

This website uses cookies.