Internet of Things, a business growing at a compound annual rate of 7,9% that is a privileged target for hackers and cyber criminals. The Internet of Things refers all objects in daily life equipped ...
Top-secret presentation Tor Stinks leaked by Snowden shows the techniques implemented by the NSA to overwhelm Tor Anonymity with manual analysis. Tor anonymity has been debated many times, acc ...
IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a detailed analysis of current security landscape, including data on main cyber threats and information on mitigation techniques. IBM iss ...
Adobe reveals customer data stolen in security breach, hackers have accessed sensitive information for 2.9 million users and to the source code of many products. Adobe Systems Inc has warned that cu ...