The importance of computer identity in network communications: how to protect it and prevent threat actors from spying or stealing…
China’s largest social media network, WeChat, is set to become an official electronic ID system in the country, an ID…
Facebook users who logged on to their accounts discovered that their accounts turned to a "memorialized account," due to their…
According to a group of researchers from the University of Trier two critical flaw affects the oAuth 2.0 authentication protocol.…
LinkedIn company filed a complaint in San Francisco against unknown hackers responsible for the creation of an impressive amount of…
The hack of a social media account is a common incident that could have a serious impact of our digital…
Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our first article we…
The demand of anonymity services is increased in response to the increase network monitoring and censorship,but the anonymity is a…
Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 05 2012. The article offers an overview on cyber security issues relating to sports…
Private companies and governments agencies all around the word make huge investments for the automation of their processes and in…
This website uses cookies.