Everyone in Italy have read of the attacks made by Anonymous against the Vatican, but very few professionals have expressed a clear…
Sometimes warfare operation and cyber crime are really difficult to distinguish, especially when the cyber scenario is related to country that…
There is no doubt that through the analysis of the operations of a State in cyber space it is possible…
No doubt the last two years witnessed the true revolution in information technology world is the development and deployment of mobile…
In this first couple of months of 2012 we have assisted to an escalation of cyber attacks made by groups…
Winds of war blowing in the Middle East, increasingly insistent rumors of a possible attack on Iran by Israel or the U.S.. In…
Everything started last week when has been announced that a laptop stolen from NASA during last year contained command codes…
Published on The Hacker News Magazine - March 2012 During the last years we have seen the tendency to use social media as…
We live in an information age in which contemporary society is like a sponge that produces and consumes extraordinary amounts…
The news is sensational and is associated with the imminent spread of the new operating system from Microsoft, Windows 8.…
This website uses cookies.