Summary of previous episodes In beginning of the year a news circulated on internet regarding the planned blackout of Internet…
The article is published on the last edition of PenTest AUDITING & STANDARDS 03 2012. Several reports published in the last…
Yesterday I discussed with a friend and colleague Francesco on the lack of awareness of Apple's users on malware that…
Today I desire to share with you the results of a study of Trend Micro security firm focused on mobile…
The story that I desire to report seems the plot of a movie, Khosrow Zarefarid an Iranian software manager after…
Another Saturday, another round, as announced today the group Anonymous has targeted government sites to protest against British government policy. Nothing…
The US Government is very close to the theme of warfare being among the countries that invest more in the…
The Utah Department of Technology Services (DTS) has announced that the Utah Department of Health (UDOH) was victim of an…
When discuss on cyber warfare we cannot regardless of the role played by nations such as China, U.S. and Russia. In…
The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we…
This website uses cookies.