Investigation

CYBERPOL Investigates Indentify theft online

CYBERPOL the International Cyber-Security Organization (ICSO)  is looking into the ID theft of personalities on social websites online that offers…

10 years ago

How to use Tor Metrics to discover censorship, the Ethiopia case

Tor Metrics Cyber intelligence units are working to develop tools and applications for a deep inspection of the hidden web…

12 years ago

Medicaid incident. How much cost a data breach?

The Utah Department of Technology Services (DTS) has announced that the Utah Department of Health (UDOH) was victim of an…

12 years ago

Social networks & Deactivated Friend Attack, the cybercrime paradise

A few days ago I wrote about the dangers relating to a not careful attendance of social networks, powerful platforms…

12 years ago

Anonymous vs Vatican, thirst for justice or criminal act?

Everyone in Italy have read of the attacks made by Anonymous against the Vatican, but very few professionals have expressed a clear…

12 years ago

Give me your mobile and I’ll tell you who you are!

No doubt the last two years witnessed the true revolution in information technology world is the development and deployment of mobile…

12 years ago

DNSChanger, FBI’s internet blackout postponed from 8 March to 9 July

Many people are asking me for updates on the case DNSChanger which held its breath many network users. During the…

12 years ago

KPN hacked, who and when warned users?

The nightmare of every Internet Service Provider has materialized in The Netherlands where KPN company, one of the main ISPs,…

12 years ago

Anonymous, it could become a cyber weapon

The group of hacktivist known as Anonymous is considered as the uncontrollable variable in the cyber space capable of surprising us with striking…

12 years ago

Symantec data leak, too many doubts on the assumption of extortion

The story is familiar to all, the Source Code, the Source code of property of Symantec company has been stolen…

12 years ago

This website uses cookies.