In recent months we have read many reports related the analysis of the famous malware and different assumptions about its genesis. Who designed the malicious agent? For what purpose? What features of Duqu…
Once upon a time the espionage made by agents who essentially lived in complete anonymity and free of the past were able to recover the greatest amount of information about…
Few days ago I have partecipated to an open discussion started by Stefano Mele, a security and cyber-terrorism expert, on the development of Internet Content Monitor…
As always support social networks are now the ideal carrier for an abnormal amount of information and this is the main reason why many governments have invested and are investing in sophisticated analysis tools that can implement intelligent search within an…
This website uses cookies.