authentication

The rise of exploit kits according to Solutionary SERT

Today I desire to discuss about a very interesting study by Solutionary's Security Engineering Research Team (SERT) that shared the…

13 years ago

SCADA and critical infrastructures, in … security

According last report published by The European Network and Information Security Agency (ENISA)   “ENISA Threat Landscape – Responding to the…

13 years ago

How were stolen 36M euro with Eurograbber malware

Zeus, a name that security experts know very well, it's one of the most prolific and dangerous malware of the history.…

13 years ago

Data theft and computer scams, Merry Christmas

The large diffusion of new services on mobile platforms and social networks was accompanied with a sensible increase of cyber…

13 years ago

Is it really so simple crack your password?

The numerous attacks and data breaches occurred during the last 12 months demonstrated that despite high attentions in security the…

13 years ago

Why humans could be the weakest link in cyber security chain?

Last month I attended the Cyber Threat Summit in Dublin and I had the opportunity to assist to the interesting…

13 years ago

Expected new wave of cyber attacks against banking

In these days it has been discussed about a possible Iranian cyber offensive against US banks immediately denied by government…

13 years ago

To be or not to be… This is Authentication

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins We use the Internet on…

13 years ago

Part 1: Authentication Series – A world of passwords

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our previous articles we…

13 years ago

RSA SecurIDs Cracked In 13 Minutes,rumors and denials

The news has creating great surprise in the security community, a group of computer scientist has declared that has cracked…

14 years ago

This website uses cookies.