Internet

Russia, cyber repression in the social networks era

Several times in these posts we have discussed of the importance of social media in recent years. Social Media are…

12 years ago

The thin line between monitoring and censorship

During the last year we have seen the consolidation of the tendency to use social media as a major vector…

12 years ago

The year of the networked protest, from SOPA act to Anonymous

It's end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what…

12 years ago

Carrier IQ, the privacy of millions of users has been violated

In recent weeks we have learned of a dialer able to track our movements, spy on our communications, read our…

12 years ago

From the mosaic theory to the stuxnet case

With the term of Mosaic theory we refer the method used in security analysis to gather information about a corporation.…

12 years ago

Banking – new threats grow

Have you ever wondered what are the main threats have concerns the banks and financial institutions? Several survey have been…

12 years ago

The utopian privacy

Are you able to imagine a world in which everybody is free to communicate without being intercepted, spied on, tracked?…

12 years ago

How much cost malware production? Which are the processes for the production of virus? (Part.2)

Here I am, as promised, to continue the research started together regarding the cost of malware. Reading news of more…

12 years ago

“Cyber India” lights and shadows of the country full of contradictions

The Economy of India is the ninth largest in the world by nominal GDP and the fourth largest by purchasing power parity (PPP). The country is a part of the G-20…

12 years ago

Cybercrime, an industry that knows no crisis

  During this days I had the opportunity to read the results of a couple of surveys: The PricewaterhouseCoopers (PwC).…

12 years ago

This website uses cookies.