Security

Serious safety and security problems in automotive, aviation, aerospace and other cyber-physical systems

Article published on The Malta Indipendent Convergence in world leading research in Europe to tackle these problems This the first part…

14 years ago

The malware factory

Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of…

14 years ago

US cyber warfare, budget cuts and shortage of cyber experts

The Flame case has raised the question on the real cyber warfare capabilities of every country, we have spoken of…

14 years ago

The right to anonymity on Internet and legal implications

The demand of anonymity services is increased in response to the increase network monitoring and censorship,but the anonymity is a…

14 years ago

Cyber security during sporting events

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 05 2012.  The article offers an overview on cyber security issues relating to sports…

14 years ago

Hacktivist vs Twitter, security of OAuth authorization

There isn’t peace for social network platforms, priority target for cybercrime and governments, they represent a mine of data useful…

14 years ago

5 Reasons Why You Need Good Patch Management

Patch management is one area where many IT organizations struggle. The operating systems vendors have done a good job with…

14 years ago

Flame and Stuxnet, the union is strength

During the Global Media and Technology Summit Eugene Kaspersky, CEO of Kaspersky Lab, revealed to the Reuters agency that the…

14 years ago

Anonymous, #OPIndia against censorship

Again Anonymous, again another hack in the name of freedom and against the censorship, this time the famous Anonymous have…

14 years ago

U.S. communication equipments subject to China cyber espionage

The new is disturbing, according to former and current intelligence sources Chinese companies have the ability to remotely access to…

14 years ago

This website uses cookies.