Security

Anonymous vs Vatican, thirst for justice or criminal act?

Everyone in Italy have read of the attacks made by Anonymous against the Vatican, but very few professionals have expressed a clear…

14 years ago

Surgical malware attack agains US via Iran

Sometimes warfare operation and cyber crime are really difficult to distinguish, especially when the cyber scenario is related to country that…

14 years ago

Why consider an enemy Iran and not Russia?

There is no doubt that through the analysis of the operations of a State in cyber space it is possible…

14 years ago

Give me your mobile and I’ll tell you who you are!

No doubt the last two years witnessed the true revolution in information technology world is the development and deployment of mobile…

14 years ago

Anonymous, DNS Amplification Attacks for Operation Global Blackout

In this first couple of months of 2012 we have assisted to an escalation of cyber attacks made by  groups…

14 years ago

Iran from cyber warfare to the oil war

Winds of war blowing in the Middle East, increasingly insistent rumors of a possible attack on Iran by Israel or the U.S.. In…

14 years ago

NASA unprepared for cyber attacks

Everything started last week when has been announced that a laptop stolen from NASA during last year contained command codes…

14 years ago

Monitoring or censorship? The big fear

Published on The Hacker News Magazine - March 2012 During the last years we have seen the tendency to use social media as…

14 years ago

Thin line between advertising and violated privacy

We live in an information age in which contemporary society is like a sponge that produces and consumes extraordinary amounts…

14 years ago

Windows 8 and Android kill switch, threats to privacy

The news is sensational and is associated with the imminent spread of the new operating system from Microsoft, Windows 8.…

14 years ago

This website uses cookies.