Today I have read several articles where is hypothesized an imminent cyber attacks of Iran cyber army against US infrastructures,…
The article is published on the last edition of PenTest AUDITING & STANDARDS 03 2012. Several reports published in the last…
Last year we have observer an impressive grow of distributed denial-of-service (DDoS) attacks mainly related to operation arranged by group…
The dramatic events of recent months have occurred in Syria should lead us all in deep thought. What value do…
The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we…
The news that I wish discuss was published on the website of Forbes magazine, titled "Shopping For Zero-Days: A Price…
Everything started last week when has been announced that a laptop stolen from NASA during last year contained command codes…
We live in an information age in which contemporary society is like a sponge that produces and consumes extraordinary amounts…
We live in economically tumultuous days and even more in the cyberspace. Not a day goes by that you do…
In the last decade we have witnessed an extraordinary evolution of those agents technically defined as the term "malware" in…
This website uses cookies.