Security

Terrorism acts vs cyber threats, new offense scenarios

We are at an historical turning point today in U.S., and the situation is similar all over the world, threat…

14 years ago

Cybersecurity market, reflections on the future

Just yesterday I was impressed by a news published on a web site that announced that global cybersecurity market will…

14 years ago

Stuxnet, are we really safe now? No, of course!

Once again I draw inspiration from the argument "Stuxnet" on which much is being read on the web at this…

14 years ago

Symantec too many doubts, disable pcAnywhere software

Remember the sensational theft of the source code of the Symantec products occurred in the last weeks? On that occasion…

14 years ago

Anonymous “United as one, divided by zero” a click for freedom

In these days we have witnessed the escalation of operations conducted by the Anonymous group, the hacker group that is…

14 years ago

Which is the main cyber threat? The violated freedom

In these days we have witnessed the escalation of attacks who took the state of Israel as a target. Groups…

14 years ago

Symantec, the inconvenient truth on the data breach

Do you remember the case of Symantec and the theft of the source code of some of its products by…

14 years ago

Japan Aerospace Exploration Agency hit by malware

To news like this we are dangerously getting used, the scenarios change but the dynamics are often the same, viruses…

14 years ago

Sykipot attacks U.S PKI infrastructures based on smart cards

In these hours on the web is turning the news of a cyber attack performed by a group of Chinese…

14 years ago

Critical infrastructures – Main threats for 2G and 3G mobile networks

Which is the critical infrastructure of a country that is most exposed to cyber threat?  The question is difficult to…

14 years ago

This website uses cookies.