Continues my overview of the main security reports published by leading companies that produce interesting analysis on the analysis of cyber threats, today I desire to introduce the data proposed by S ...
The use of technologies to support censorship is deplorable and condemnable but it must be considered that is a sad reality that has sustained the growth of a billionaire market. Many IT companies aro ...
Once again the security of large scale application and platform is challenged, today is the turn of Apple, in particular of its famous Apple store that according the Researchers Elie Bursztein was v ...
Recently many security portals, including Security Affairs, have presented analysis on underground markets and the increased demand of malware and exploit tools. In this post I desire to prop ...