In recent years social networks have succeeded in the historic feat of bringing to the web a growing number of users. Jupiter users, the elderly, individuals and businesses all within the large network, many, too much, share the total awareness of what happens when they put their credentials or when attracted by a novice or by a video click on a link. Or this behavior often blind managers of the major social platforms do not provide useful information because it can spread real awareness of the threat they face. Social networks have […]
Few days ago I have partecipated to an open discussion started by Stefano Mele, a security and cyber-terrorism expert, on the development of Internet Content Monitor System by the Soviet government. In April, the “Russian Federal Service for Supervision Telecoms” has announced it that it has launched a tender for developing a Content Monitor System with a budget of $ 530,000. Following the tender the development phase was started in august and have […]
Let me share with you the paper “A study of malicious attacks on Facebook” presented by Robert Sandilands during the event VB2011 that was held from October the 3rd till the 7th in Barcelona, Spain. A well made summary on the main attacks on a social network widely used around the world but also widely […]
As always support social networks are now the ideal carrier for an abnormal amount of information and this is the main reason why many governments have invested and are investing in sophisticated analysis tools that can implement intelligent search within an ocean seemingly unrelated data. An unit part of the CIA’s Open Source Center is responsible for monitoring the vast and various social networks, local and international news, radio, and television, Internet chat rooms, and pretty much anything from […]
Online Social Networks(OSN) are an integral part of today’s Web. Hacktivist,Politicians, celebrities, revolutionists, and others use OSNs as carrier for their message to a wide audience. The downside is that these powerful tools can be used to spread disinformation and propaganda. The next generation of social engineering attacks is even more deceptive; they employ an automation software called a […]
Welcome on board Welcome! If you are curious, interested in the subject and looking for a place with a few clicks you canbe updated on what happens in the world … well you you’ve found it. I read news and comments from everywhere on the web and I decided to open this space toshare with you thoughts, words and advice regarding IT security. Now enough talking … let’s go. The journey is long.