Several times in these posts we have discussed of the importance of social media in recent years. Social Media are…
During the last year we have seen the consolidation of the tendency to use social media as a major vector…
It's end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what…
With the term of Mosaic theory we refer the method used in security analysis to gather information about a corporation.…
In this article I wish to bring to your attention what I regard as gross contradiction of a nation whose…
Are you able to imagine a world in which everybody is free to communicate without being intercepted, spied on, tracked?…
Social Network Poisoning term refers the effect produced by the application of methods designed to make unreliable the knowledge related…
If we talk about security which could be our worst nightmare? My answer is "to be vulnerable in every moment…
Let we use these ingredients to start some serious reflection on safety issues related to mobile devices: Robust growth in…
Cryptome, known as Wikileaks’s competitor site has published online several reserved documents revealing that the police have access to information of social networks. The documents describe how the police is able to access to Facebook user…
This website uses cookies.