Social Networks

Social Media, exercise or not exercise the control

Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and…

14 years ago

Which is the main cyber threat? The violated freedom

In these days we have witnessed the escalation of attacks who took the state of Israel as a target. Groups…

14 years ago

The strategic importance of censorship in search engines

Every day, billions of people making an unimaginable number of searches through search engines. Complex algorithms seek to recover in…

14 years ago

The power of social networks

For years now we live with the confirmation of the importance of social networks and their impact on daily life.…

14 years ago

Russia, cyber repression in the social networks era

Several times in these posts we have discussed of the importance of social media in recent years. Social Media are…

14 years ago

The thin line between monitoring and censorship

During the last year we have seen the consolidation of the tendency to use social media as a major vector…

14 years ago

The year of the networked protest, from SOPA act to Anonymous

It's end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what…

14 years ago

From the mosaic theory to the stuxnet case

With the term of Mosaic theory we refer the method used in security analysis to gather information about a corporation.…

14 years ago

India The blurred line between defense and cyber censorship

In this article I wish to bring to your attention what I regard as gross contradiction of a nation whose…

14 years ago

Top Nine cyber security trends for 2012? They are too few, isn’t it?

In this article I intend to read with you an interesting document, distributed by Imperva, in which they emphasized, the main threats that could cause significant problems in the coming year.  Please…

14 years ago

This website uses cookies.