cyber threats

Almost all game hacks are infected with malware

Security worldwide community is alarmed by the explosion of number of cyber threats that are becoming even more sophisticated and…

13 years ago

Stylometric analysis to track anonymous users in the underground

Law enforcement and intelligence agencies conscious of the high risks related to cyber threats have started massive monitoring campaign, everything…

13 years ago

Trend Micro Q3 security report

Trend Micro has released the report "3Q 2012 SECURITY ROUNDUP -Android Under Siege: Popularity Comes at a Price" that presents…

13 years ago

Anonymous vs Wikileaks…you can condemn a man but not wipe out an ideology

Hacktivism is considered one of the most interesting phenomena of the last year, despite this form of dissent is dated…

13 years ago

Why do we need hackers today?

In the last decade the role of hacker is deeply changed, these strange characters were once kept away from government…

13 years ago

Team GhostShell hacktivists against temples of knowledge

In this days the hacking group Team GhostShell claimed credit for the hack of  servers of the 100 principal universities…

13 years ago

GAO invites FDA to improve Information Security for medical devices

In the last decade the number of cyber incidents related to technologies that surround us is growth exponentially, the principal…

13 years ago

Why humans could be the weakest link in cyber security chain?

Last month I attended the Cyber Threat Summit in Dublin and I had the opportunity to assist to the interesting…

13 years ago

Malware,Botnet & cyber threats,what is happening to the cyberspace?

Article published on Hakin9 IT Security Magazine "Raspberry Pi Hacking – Exploiting Software" 08/12 The article proposes an analysis of…

13 years ago

CleanIT project, concerns for a global surveillance project

I'm just returned from the Cyber Threat Summit in Dublin, one of the most interesting European events in cyber security…

13 years ago

This website uses cookies.