cyber threats

Almost all game hacks are infected with malwareAlmost all game hacks are infected with malware

Almost all game hacks are infected with malware

Security worldwide community is alarmed by the explosion of number of cyber threats that are becoming even more sophisticated and…

12 years ago
Stylometric analysis to track anonymous users in the undergroundStylometric analysis to track anonymous users in the underground

Stylometric analysis to track anonymous users in the underground

Law enforcement and intelligence agencies conscious of the high risks related to cyber threats have started massive monitoring campaign, everything…

13 years ago
Trend Micro Q3 security reportTrend Micro Q3 security report

Trend Micro Q3 security report

Trend Micro has released the report "3Q 2012 SECURITY ROUNDUP -Android Under Siege: Popularity Comes at a Price" that presents…

13 years ago
Anonymous vs Wikileaks…you can condemn a man but not wipe out an ideologyAnonymous vs Wikileaks…you can condemn a man but not wipe out an ideology

Anonymous vs Wikileaks…you can condemn a man but not wipe out an ideology

Hacktivism is considered one of the most interesting phenomena of the last year, despite this form of dissent is dated…

13 years ago
Why do we need hackers today?Why do we need hackers today?

Why do we need hackers today?

In the last decade the role of hacker is deeply changed, these strange characters were once kept away from government…

13 years ago
Team GhostShell hacktivists against temples of knowledgeTeam GhostShell hacktivists against temples of knowledge

Team GhostShell hacktivists against temples of knowledge

In this days the hacking group Team GhostShell claimed credit for the hack of  servers of the 100 principal universities…

13 years ago
GAO invites FDA to improve Information Security for medical devicesGAO invites FDA to improve Information Security for medical devices

GAO invites FDA to improve Information Security for medical devices

In the last decade the number of cyber incidents related to technologies that surround us is growth exponentially, the principal…

13 years ago
Why humans could be the weakest link in cyber security chain?Why humans could be the weakest link in cyber security chain?

Why humans could be the weakest link in cyber security chain?

Last month I attended the Cyber Threat Summit in Dublin and I had the opportunity to assist to the interesting…

13 years ago
Malware,Botnet & cyber threats,what is happening to the cyberspace?Malware,Botnet & cyber threats,what is happening to the cyberspace?

Malware,Botnet & cyber threats,what is happening to the cyberspace?

Article published on Hakin9 IT Security Magazine "Raspberry Pi Hacking – Exploiting Software" 08/12 The article proposes an analysis of…

13 years ago
CleanIT project, concerns for a global surveillance projectCleanIT project, concerns for a global surveillance project

CleanIT project, concerns for a global surveillance project

I'm just returned from the Cyber Threat Summit in Dublin, one of the most interesting European events in cyber security…

13 years ago