Hackers

Sykipot attacks U.S PKI infrastructures based on smart cards

In these hours on the web is turning the news of a cyber attack performed by a group of Chinese…

14 years ago

Banking sector, bad news regarding cyber threats

The new year does not bode well in terms of cyber threats banking universe. The need for new services, primarily…

14 years ago

North Korea, why too many see it as a cyber threat?

In the recent years we have seen increasing attention from governments in the presidium of the cyber space. The concept…

14 years ago

Rim, Nokia and Apple. Monitoring, interferences and violated privacy

What I want to discuss today is the interference of governments in what should be the private business and what…

14 years ago

“Cyber China” From Operation Aurora to China Cyber attacks Syndrome

Cyber China is considered the most active persistent collector of Western intelligence and intellectual property, is it a syndrome or…

14 years ago

Symantec hack, some further considerations

No doubt, the news of the beginning of the year is the alleged theft of the source of the Symantec…

14 years ago

The nightmare backdoor , reflections on the case Huawei

Just at this time I came across an interesting discussion proposed by a colleague on the possible presence of a…

14 years ago

2012, the threat of malware. Evolution in the mobile scenario

Wanting to try out hypotheses about the future of the spread of malware, we cannot help but examine the mobile…

14 years ago

Why the use of a cyber weapon has proved a winner?

In recent months one of the topics of greatest interest in the international scientific community has been the development of…

14 years ago

The strategic importance of censorship in search engines

Every day, billions of people making an unimaginable number of searches through search engines. Complex algorithms seek to recover in…

14 years ago

This website uses cookies.