Hacking

Symantec hack, some further considerations

No doubt, the news of the beginning of the year is the alleged theft of the source of the Symantec…

14 years ago

The nightmare backdoor , reflections on the case Huawei

Just at this time I came across an interesting discussion proposed by a colleague on the possible presence of a…

14 years ago

2012, the threat of malware. Evolution in the mobile scenario

Wanting to try out hypotheses about the future of the spread of malware, we cannot help but examine the mobile…

14 years ago

Why the use of a cyber weapon has proved a winner?

In recent months one of the topics of greatest interest in the international scientific community has been the development of…

14 years ago

The strategic importance of censorship in search engines

Every day, billions of people making an unimaginable number of searches through search engines. Complex algorithms seek to recover in…

14 years ago

Hardware qualification, a must in a cyber strategy

We live in the era of free technology market , devices and appliances of all kinds can be found on…

14 years ago

The power of social networks

For years now we live with the confirmation of the importance of social networks and their impact on daily life.…

14 years ago

WiFi Protected Setup vulnerable to Reaver tool attack

Wi-Fi Protected Setup (WPS; originally Wi-Fi Simple Config) is a computing standard used to allow easy establishment of a secure…

14 years ago

Stuxnet, Duqu and the sons of the “Tilded” platform

We all have heard of Stuxnet viruses, malware that has undoubtedly marked a new era in the field. It is…

14 years ago

GSM mobile … the insecure network

The latest discovered vulnerability in GSM ( Global System for Mobile) technology is worrying many telecom operators of several countries due…

14 years ago

This website uses cookies.