Not a day goes by that we're talking about powerful cyber attacks and the sensational cyber espionage campaigns, the dangerous…
The use of technologies to support censorship is deplorable and condemnable but it must be considered that is a sad…
In this days it is circulating persistently the news that The Cyber Intelligence Sharing and Protection act (CISPA) will be reintroduced…
Fortinet company, the worldwide provider of network security appliances and a market leader in unified threat management (UTM), has recently…
On September 2012 the German security firm G Data Software detected a botnet with a particular feature, it is controlled from an Internet…
Last year I wrote about a new powerful surveillance system that Russian government committed to private business to implement a…
Trend Micro published a very interesting report on the Russian underground market, the document written by Max Goncharov analyzed the…
After much work during the last months I'm proud and happpy to announce the publishing of The Deep Dark Web…
Article published on The Malta Indipendent on October 14th 2012 Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins …
Article published on Hakin9 IT Security Magazine "Raspberry Pi Hacking – Exploiting Software" 08/12 The article proposes an analysis of…
This website uses cookies.