In the last weeks we discussed on the efficiency of exploit kits, malicious tool kits that allow to the attackers to exploit a huge quantity of vulnerabilities in victims systems. These products are ...
Today Twitter announced that has detected some suspect patterns related an unauthorized access attempts to Twitter user data, in a nutshell hackers breach Twitter this week and may they obtained acces ...
Bring your own device (BYOD) is starting to take off in the workplace, as an increasing number of businesses encourage their employees to use smart phones, tablets or laptops to save costs and to allo ...
The news is sensational as granted one of the most important journal, the New York Times has announced that during the last months it was victim of cyber espionage coordinated by Chinese hackers proba ...