This report provides a brief overview of some basic underground activities in the mobile space in China, describing products and services. Security firm Trend Micro issued an interesting report on Ch ...
A serious flaw in the certificate verification process of GnuTLS exposes Linux distros, apps to attack. Another flaw exploitable for surveillance purposes. GnuTLS is an open source secure communicati ...
Experts that are monitoring the escalation of tension in Crimea recognized a military strategy similar to the one adopted in Georgia (2008) The approval of Russian Parliament for military use in Crim ...
Africa Security & Counter-Terrorism Summit in London Chaired by President of European Centre for Information Policy and Security ECIPS The Africa Security & Counter-Terrorism Summit held i ...