cyber threats

Cyber threats scare a society increasingly dependent on technologyCyber threats scare a society increasingly dependent on technology

Cyber threats scare a society increasingly dependent on technology

Experts estimated that between 25 to 50 billion devices will be connected to the internet by 2020 will be exposed…

10 years ago
Obama signed an executive order as deterrent against hackingObama signed an executive order as deterrent against hacking

Obama signed an executive order as deterrent against hacking

A new executive order signed by the US President Obama imposes sanctions against every entities that is threatening US assets,…

10 years ago
Weaknesses in Air Traffic Control Systems are a serious issue for FAAWeaknesses in Air Traffic Control Systems are a serious issue for FAA

Weaknesses in Air Traffic Control Systems are a serious issue for FAA

A GAO report to FAA reveals that the systems adopted in the Aviation industry are still affected by weaknesses that…

10 years ago
Cybercrime – UNICRI study analyzed risks for the economy and enterprisesCybercrime – UNICRI study analyzed risks for the economy and enterprises

Cybercrime – UNICRI study analyzed risks for the economy and enterprises

UNICRI published a study on the impact of the cybercrime on the economy in the Europen region with a specific…

10 years ago
Reading the ENISA Threat Landscape 2014 reportReading the ENISA Threat Landscape 2014 report

Reading the ENISA Threat Landscape 2014 report

The European Union Agency for Network and Information Security has published the annual report on the cyber threat landscape "ENISA…

10 years ago
Why the agreement between ENISA and EUROPOL is strategic?Why the agreement between ENISA and EUROPOL is strategic?

Why the agreement between ENISA and EUROPOL is strategic?

ENISA and Europol have signed an agreement with the intent to facilitate the cooperation in the fight to the cyber…

11 years ago
Security threat landscape in the Middle East … the mined cyber areaSecurity threat landscape in the Middle East … the mined cyber area

Security threat landscape in the Middle East … the mined cyber area

Analysis of the cyber threat landscape in the Middle East region provided by Tim Rains, director of Trustworthy Computing at…

11 years ago
Cyber Threat summit 2013 – Modern online-banking cybercrimeCyber Threat summit 2013 – Modern online-banking cybercrime

Cyber Threat summit 2013 – Modern online-banking cybercrime

"Modern online-banking cybercrime" -The presentation analyzes current context for cybersecurity in Banking focusing on cyber threats and countermeasures. Today I…

12 years ago
A reading of the ENISA Annual Incident Reports 2012A reading of the ENISA Annual Incident Reports 2012

A reading of the ENISA Annual Incident Reports 2012

ENISA issued the ENISA Annual Incident Reports 2012 on significant incidents in the electronic communications sector, which were reported to…

12 years ago
The Security State of WordPress’ Top 50 PluginsThe Security State of WordPress’ Top 50 Plugins

The Security State of WordPress’ Top 50 Plugins

Checkmarx’s report analyzed the security of the top 50 most popular plugins (in general), as well as the top 10…

12 years ago