0-day vulnerabilities

ReVuln – gaming platforms as vector of cyber attack

The excellent researchers at ReVuln, Luigi Auriemma and Donato Ferrante, presented at Black Hat Europe 2013 in Amsterdam a way to…

11 years ago

The rise of exploit kits according to Solutionary SERT

Today I desire to discuss about a very interesting study by Solutionary's Security Engineering Research Team (SERT) that shared the…

11 years ago

Elderwood project, who is behind Op. Aurora and ongoing attacks?

Today I desire to discuss on the real effect of a cyber attack, we have recently introduced the direct and…

12 years ago

The importance of security requirements in design of SCADA systems

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 06 2012 The article exposes the main issues…

12 years ago

NFC, business opportunities, security and privacy issues

The NFC technology Near field communication (NFC) is a set of standards for Smartphones and similar devices to establish radio communication with each other by…

12 years ago

This website uses cookies.