Interesting vision on privacy issues related to the development of the paradigm of Big data. Who and how will manage a so precious mine of information? Discussions about issues created by the so call ...
The Egyptian penetration tester Ahmed Elsobky discovered a serious flaw that allows attackers to sniff user's traffic including access token. Facebook is vulnerable to Man-in-the-Middle Attack, ...
Crimea – The Russian Cyber Strategy to Hit Ukraine The escalation of tension in Crimea is having repercussion also in cyberspace. Russia cyber strategy appears similar to the one adopted before the ...
The Military Cyber Spending reserved by the Pentagon for cyber operations next year is $5 Billion, part of the comprehensive $496 billion fiscal 2015 budget $5 Billion in Military Cyber Spending, t ...