Google

Google used as cyber weapon. New attack method found

True, sometimes the big discoveries are the daughters of the case. That's what happened to Panos Ipeirotis, a researcher of…

14 years ago

Thin line between advertising and violated privacy

We live in an information age in which contemporary society is like a sponge that produces and consumes extraordinary amounts…

14 years ago

Windows 8 and Android kill switch, threats to privacy

The news is sensational and is associated with the imminent spread of the new operating system from Microsoft, Windows 8.…

14 years ago

Google code used to circumvent privacy protections … true or false?

The Wall Street Journal in recent days has published a report on the activities of the Google company against Apple's…

14 years ago

Anonymous, it could become a cyber weapon

The group of hacktivist known as Anonymous is considered as the uncontrollable variable in the cyber space capable of surprising us with striking…

14 years ago

The strategic importance of censorship in search engines

Every day, billions of people making an unimaginable number of searches through search engines. Complex algorithms seek to recover in…

14 years ago

The power of social networks

For years now we live with the confirmation of the importance of social networks and their impact on daily life.…

14 years ago

OSINT and the mine called “Internet”. How to …

All of us have received news regarding the incident occurred to Stratfor during this days, and we have learned that…

14 years ago

Iran, the cyber threat … are we creating a new enemy ?

"Iran, the super power capable of threatening the world". This is the title of a hypothetical sensationalist article aimed to…

14 years ago

The thin line between monitoring and censorship

During the last year we have seen the consolidation of the tendency to use social media as a major vector…

14 years ago

This website uses cookies.