Time passes and the dispute between Iran and Israel is becoming increasingly more complex to manage. Apparently everything seems crystallized waiting for one of the contenders make the first move, i ...
After the publishing of the book "Deep Dark Web" many colleagues asked me to explain how does work the finance in hidden world and which is the currency used for the transactions? Of course I receive ...
The numerous attacks and data breaches occurred during the last 12 months demonstrated that despite high attentions in security the principal causes of the incidents are leak of authentication process ...
Let me present you a very interesting study on cyber security landscape in Africa, conducted by IDG Connect, division of International Data Group (IDG), to which I gave my humble contribution. Ac ...