cyber threats

Cyber security during sporting events

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 05 2012.  The article offers an overview on cyber security issues relating to sports…

14 years ago

Hacktivist vs Twitter, security of OAuth authorization

There isn’t peace for social network platforms, priority target for cybercrime and governments, they represent a mine of data useful…

14 years ago

Google Online Security against state-sponsored attacks

According to a post of Eric Grosse, VP of security engineering at Google, on Google Online Security blog the company is…

14 years ago

In the shadow of the Flame, Warner Bros, China Telecom & US Navy hacks

What's happening while the world's attention is on Flame malware? The cyberspace is a very turbulent place where groups of…

14 years ago

Plan X, new lymph to US cyber warfare capabilities

Recent events have demonstrated the strategic importance of the cyber strategy the needs to chair the cyber space, many experts…

14 years ago

Israel and Iran, expense, capabilities and cyber strategies

In recent days the discovery of Flame malware  has captured the attention of the media, the internet is monopolized by related news, many experts have identified Israel as the author of…

14 years ago

DDoS attack against 123-reg, the Chinese paranoia

The UK’s companies 123-reg, the biggest domain provider,  was hit this week by a “massive” DDoS attack that caused interruption…

14 years ago

McAfee Report on alarming growth of cyber threats

I find really interesting the report released by security firms regarding the principal cyber threats and the related evolution. This…

14 years ago

Insider perspectives on the status of global cyber safety and security status (Part 2 of 4)

Article published on The Malta Indipendent Critical infrastructure protection, StuxNet, exploding computers, blackouts, collapsing banking systems, and cyber war!! None of…

14 years ago

2011 IC3 – Internet Crime Report

In this article I desire to discuss about the data provided in the 2011 IC3 Internet Crime Report that provide…

14 years ago

This website uses cookies.