Google has just revealed the details on tree new technologies, uProxy, Digital Attack Map and Project Shield, to secure the…
The article proposes the analysis of the impact on the use of the Tor network after the events related to…
The use of technologies to support censorship is deplorable and condemnable but it must be considered that is a sad…
In many occasion we have discussed about the consequences of monitoring activities on internet and communication channels operated by governments…
Just one week ago a UN treaty was approved to update 24-year-old United Nations telecommunications rules. The agreement states that…
Once again the group of hackers Team Ghostshell conquers a record to have attacked major organizations and expose around 1.6 million…
Recently I wrote a post to describe the national blackout occurred is Syria, the event officially justified by the regime…
Article published on The Malta Indipendent on October 21th 2012 Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins Every…
I desire to tribute another article to the group that catch the worldwide attention of security community, Anonymous. Few years…
We clarified the use of anonymizing networks is not only related to criminal intents, they represent in fact a…
This website uses cookies.