Incident

Terrorism acts vs cyber threats, new offense scenarios

We are at an historical turning point today in U.S., and the situation is similar all over the world, threat…

13 years ago

Symantec too many doubts, disable pcAnywhere software

Remember the sensational theft of the source code of the Symantec products occurred in the last weeks? On that occasion…

13 years ago

Symantec, the inconvenient truth on the data breach

Do you remember the case of Symantec and the theft of the source code of some of its products by…

13 years ago

Israel under a cyber warfare escalation

This week has began under worse auspices worse for Israel, which, despite its attention to the cyber threats posed by…

13 years ago

Zappos data breach, 24M users exposed

In this hours is circulating in internet the news regarding a new clamorous hack that this time has hit the…

13 years ago

Symantec hack, some further considerations

No doubt, the news of the beginning of the year is the alleged theft of the source of the Symantec…

13 years ago

The nightmare backdoor , reflections on the case Huawei

Just at this time I came across an interesting discussion proposed by a colleague on the possible presence of a…

13 years ago
Why the use of a cyber weapon has proved a winner?Why the use of a cyber weapon has proved a winner?

Why the use of a cyber weapon has proved a winner?

In recent months one of the topics of greatest interest in the international scientific community has been the development of…

13 years ago

Hardware qualification, a must in a cyber strategy

We live in the era of free technology market , devices and appliances of all kinds can be found on…

13 years ago

The power of social networks

For years now we live with the confirmation of the importance of social networks and their impact on daily life.…

13 years ago