Facebook

New Drive-By Spam Infects unsuspecting users

The threat arrives via email, is now read consuetidine attacks that use email as a vector for spreading malware. Until…

14 years ago

Social Media, exercise or not exercise the control

Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and…

14 years ago

The power of social networks

For years now we live with the confirmation of the importance of social networks and their impact on daily life.…

14 years ago

Russia, cyber repression in the social networks era

Several times in these posts we have discussed of the importance of social media in recent years. Social Media are…

14 years ago

The thin line between monitoring and censorship

During the last year we have seen the consolidation of the tendency to use social media as a major vector…

14 years ago

The year of the networked protest, from SOPA act to Anonymous

It's end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what…

14 years ago

2011, CAs are under attack. Why steal a certificate?

2011 was a terrible year for the certification authorities, the number of successful attacks against some major companies reported is…

14 years ago

India The blurred line between defense and cyber censorship

In this article I wish to bring to your attention what I regard as gross contradiction of a nation whose…

14 years ago

Top Nine cyber security trends for 2012? They are too few, isn’t it?

In this article I intend to read with you an interesting document, distributed by Imperva, in which they emphasized, the main threats that could cause significant problems in the coming year.  Please…

14 years ago

The utopian privacy

Are you able to imagine a world in which everybody is free to communicate without being intercepted, spied on, tracked?…

14 years ago

This website uses cookies.