Security

Young cyber army, cyber threat or resource to enhance?

We live in economically tumultuous days and even more in the cyberspace. Not a day goes by that you do…

14 years ago

Cyber arms race, too many shadows on the future

The Mehr News Agency has published a declaration of brigadier general Gholamreza Jalali collected during an official conference that demonstrate…

14 years ago

GPS Spoofing, old threat and new problems

For several years are known vulnerabilities of GPS systems, but the wide use of these technology in today's society need…

14 years ago

Critical infrastructures & manipulation of the name Anonymous

What are the main dangers for our infrastructures? Too much threats which any country is exposed. The situation is bleak,…

14 years ago

Google code used to circumvent privacy protections … true or false?

The Wall Street Journal in recent days has published a report on the activities of the Google company against Apple's…

14 years ago

Stopped antivirus for Iran, controversial penalty

I have just read the news that Iran will be banned the purchase of antivirus systems, a kind of technological…

14 years ago

DNSChanger and the FBI’s internet blackout on 8 March

For several days the news circulating online about a planned blackout of Int the rnet for million of users on…

14 years ago

Censorship – Why Anonymous is interested to the Great Firewall of China?

  The Chinese government is famous for the high level of monitoring implemented on the internet and in the specific…

14 years ago

Banking sector under attack, are we ready to the challenge?

Where can I find money? At the bank of course, this is the thought which underlies dell'orietamento of cyber crime…

14 years ago

Nortel, from industrial espionage to bankruptcy

By now the news of successful attacks perpetrated against private companies are no more surprising except sometimes for inefficiency of…

14 years ago

This website uses cookies.