Digital Identity

The importance of computer identity in network communications: how to protect it and prevent its theft

The importance of computer identity in network communications: how to protect it and prevent threat…

WeChat is set to become China’s official electronic ID system

China’s largest social media network, WeChat, is set to become an official electronic ID system…

A Facebook glitch declared all its users are dead, including Zuckerberg

Facebook users who logged on to their accounts discovered that their accounts turned to a…

A research team has found two flaws in the OAuth 2.0 protocol

According to a group of researchers from the University of Trier two critical flaw affects…

LinkedIn – Surge of fake profiles and increment of illicit activities

LinkedIn company filed a complaint in San Francisco against unknown hackers responsible for the creation…

Social media and digital identity. Prevention and incident response

The hack of a social media account is a common incident that could have a…

Social Networks Part 3 – Are you exposing yourself unnecessarily to physical threats?

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins…

The right to anonymity on Internet and legal implications

The demand of anonymity services is increased in response to the increase network monitoring and…

Cyber security during sporting events

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 05 2012.  The…

What is a digital signature? Fundamental principles

Private companies and governments agencies all around the word make huge investments for the automation…

This website uses cookies.