Espionage

Hardware qualification, a must in a cyber strategy

We live in the era of free technology market , devices and appliances of all kinds can be found on…

14 years ago

The power of social networks

For years now we live with the confirmation of the importance of social networks and their impact on daily life.…

14 years ago

GSM mobile … the insecure network

The latest discovered vulnerability in GSM ( Global System for Mobile) technology is worrying many telecom operators of several countries due…

14 years ago

Iran threat … are we close to the conflict?

These days, there are countless news regarding the Iranian government and its ability to pursue its objectives of a cyber…

14 years ago

Stratfor hack, “not so private and secret anymore”?

This Christmas will be reminded also for the hack of the Stratfor Global Intelligence service made by collective Anonymous who…

14 years ago

Israeli spy gear sent to Iran via Denmark, the dirty trade

Today I will discuss with you about the news that I was very impressed regarding the sale of a internet…

14 years ago

Russia, cyber repression in the social networks era

Several times in these posts we have discussed of the importance of social media in recent years. Social Media are…

14 years ago

The thin line between monitoring and censorship

During the last year we have seen the consolidation of the tendency to use social media as a major vector…

14 years ago

Software piracy,from statistics to hypotheses of cyber warfare

With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether…

14 years ago

The year of the networked protest, from SOPA act to Anonymous

It's end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what…

14 years ago

This website uses cookies.