With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether…
It's end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what…
2011 was a terrible year for the certification authorities, the number of successful attacks against some major companies reported is…
In recent weeks we have learned of a dialer able to track our movements, spy on our communications, read our…
With the term of Mosaic theory we refer the method used in security analysis to gather information about a corporation.…
In this article I wish to bring to your attention what I regard as gross contradiction of a nation whose…
In recent weeks we have discussed a lot about cyber crime and how it is assuming frightening proportions. A growing…
In this article I intend to read with you an interesting document, distributed by Imperva, in which they emphasized, the main threats that could cause significant problems in the coming year. Please…
Have you ever wondered what are the main threats have concerns the banks and financial institutions? Several survey have been…
Are you able to imagine a world in which everybody is free to communicate without being intercepted, spied on, tracked?…
This website uses cookies.