cyber threats

Nortel, from industrial espionage to bankruptcy

By now the news of successful attacks perpetrated against private companies are no more surprising except sometimes for inefficiency of…

14 years ago

Trustwave vs Mozilla community for MITM Digital Certificate

After the attacks against certification authorities such as VeriSign, Comodo and DigiNotar the level of confidence in the model based…

14 years ago

Iran case … security threat and oil business

At this time we are seeing continuing propaganda operations of Iranian government that is trying to convince with its proclamations the…

14 years ago

Cloud Computing forensic psychological considerations on security

Cloud computing will play an increasingly critical role in the future of the information technology sector, impacting individual consumers, corporations, governments, and international…

14 years ago

Symantec data leak, too many doubts on the assumption of extortion

The story is familiar to all, the Source Code, the Source code of property of Symantec company has been stolen…

14 years ago

Hacking satellite communications and possible implication

Once more to worry about is the real security of satellite infrastructures. In a technological civilization satellites play a vital…

14 years ago

Anonymous vs FBI, threat or voice to listen?

No doubts about the ability of the Anonymous group since the beginning years have intensified their activities demonstrating great technical…

14 years ago

Underestimate the threat, a serious error

In recent years it has fully understood the offensive capability of the use of cyber weapons, highly efficient tools to…

14 years ago

VeriSign Hacked. Why?

No peace in the cyber space, day after day we read that the computer systems for major corporations and governments…

14 years ago

Terrorism acts vs cyber threats, new offense scenarios

We are at an historical turning point today in U.S., and the situation is similar all over the world, threat…

14 years ago

This website uses cookies.