Investigation

Cybersecurity market, reflections on the future

Just yesterday I was impressed by a news published on a web site that announced that global cybersecurity market will…

14 years ago

Social Media, exercise or not exercise the control

Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and…

14 years ago

Chinese Attacks on Defense Contractors, 2 clues are evidence

It's not first time and the news itself doesn't rapresent a surprise, once again Chinese hacker groups are involved in…

14 years ago

Japan under cyber attack. The cyber threat China

The events of recent days from the closure of the Megaupload web site to the heavy offensive of the Anonymous…

14 years ago

India, inadequate laws, wrong policies and the hazard of regression

India, a nation technologically advanced, of which we have so much discussed in recent weeks. We have discussed about the…

14 years ago

Sykipot attacks U.S PKI infrastructures based on smart cards

In these hours on the web is turning the news of a cyber attack performed by a group of Chinese…

14 years ago

The strategic importance of censorship in search engines

Every day, billions of people making an unimaginable number of searches through search engines. Complex algorithms seek to recover in…

14 years ago

Stratfor hack, “not so private and secret anymore”?

This Christmas will be reminded also for the hack of the Stratfor Global Intelligence service made by collective Anonymous who…

14 years ago

Russia, cyber repression in the social networks era

Several times in these posts we have discussed of the importance of social media in recent years. Social Media are…

14 years ago

Carrier IQ, the privacy of millions of users has been violated

In recent weeks we have learned of a dialer able to track our movements, spy on our communications, read our…

14 years ago

This website uses cookies.