Digital Identity

The importance of computer identity in network communications: how to protect it and prevent its theft

The importance of computer identity in network communications: how to protect it and prevent threat actors from spying or stealing…

4 years ago

WeChat is set to become China’s official electronic ID system

China’s largest social media network, WeChat, is set to become an official electronic ID system in the country, an ID…

7 years ago

A Facebook glitch declared all its users are dead, including Zuckerberg

Facebook users who logged on to their accounts discovered that their accounts turned to a "memorialized account," due to their…

8 years ago

A research team has found two flaws in the OAuth 2.0 protocol

According to a group of researchers from the University of Trier two critical flaw affects the oAuth 2.0 authentication protocol.…

9 years ago

LinkedIn – Surge of fake profiles and increment of illicit activities

LinkedIn company filed a complaint in San Francisco against unknown hackers responsible for the creation of an impressive amount of…

11 years ago

Social media and digital identity. Prevention and incident response

The hack of a social media account is a common incident that could have a serious impact of our digital…

11 years ago

Social Networks Part 3 – Are you exposing yourself unnecessarily to physical threats?

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our first article we…

12 years ago

The right to anonymity on Internet and legal implications

The demand of anonymity services is increased in response to the increase network monitoring and censorship,but the anonymity is a…

12 years ago

Cyber security during sporting events

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 05 2012.  The article offers an overview on cyber security issues relating to sports…

12 years ago

What is a digital signature? Fundamental principles

Private companies and governments agencies all around the word make huge investments for the automation of their processes and in…

12 years ago

This website uses cookies.