Security researcher Ian Malloy has identified a new group of hackers dubbed The Al Assam AlaikumCyber Unit linked to recent…
The article proposes the analysis of the impact on the use of the Tor network after the events related to…
Public offer of Zeus FaaS service on Facebook My readers know very well the dynamic of cybercrime enterprise and in particular of…
Not a day goes by that we're talking about powerful cyber attacks and the sensational cyber espionage campaigns, the dangerous…
The use of technologies to support censorship is deplorable and condemnable but it must be considered that is a sad…
In this days it is circulating persistently the news that The Cyber Intelligence Sharing and Protection act (CISPA) will be reintroduced…
Fortinet company, the worldwide provider of network security appliances and a market leader in unified threat management (UTM), has recently…
On September 2012 the German security firm G Data Software detected a botnet with a particular feature, it is controlled from an Internet…
Last year I wrote about a new powerful surveillance system that Russian government committed to private business to implement a…
Trend Micro published a very interesting report on the Russian underground market, the document written by Max Goncharov analyzed the…
This website uses cookies.