The control of information is the main concern of Governments. More or less declared the major players of a precarious global economy have implemented digital surveillance systems, from India to China, passing Russia and…
When I discussed with many colleagues regarding cloud paradigm most of them smiled declaring that we face yet another found…
It is clear that the question awaits an answer deterministic, but an assessment of the main factors that influence the "final expense". My idea is to understand what is the magnitude of…
In recent months it has had discussions about the possibility of blocking sites that somehow support the distribution of pirated…
The SCADA systems at the Water utilities in Illinois were hacked by a malicious attacker. “the SCADA system was powered…
Last week I had the opportunity to discuss with my father of adverse economic situation and in particular of the…
What is purpose for DNS cache poisoning attacks? DNS cache poisoning is an attack methodology used to compromise in the…
In a few days we have heard of a couple of satellite attacks by hackers meanwhile surfing on the web…
F-Secure Researchers have discovered a digitally signed malware that has code signed with a stolen government certificate belonging to the…
""If you open the window for fresh air, you have to expect some flies to blow in" this is the Deng Xiaoping’s phrase, which summarizes the essence of the…
This website uses cookies.