After the publishing of the book "Deep Dark Web" many colleagues asked me to explain how does work the finance in hidden world and which is the currency used for the transactions? Of course I receive ...
The numerous attacks and data breaches occurred during the last 12 months demonstrated that despite high attentions in security the principal causes of the incidents are leak of authentication process ...
Let me present you a very interesting study on cyber security landscape in Africa, conducted by IDG Connect, division of International Data Group (IDG), to which I gave my humble contribution. Ac ...
Last week I discussed with a friend on the risks related to attacks of the group Anonymous against strategic offices in Italy. In that occasion I didn't excluded offensives of the group of hacktivists ...