Several times in these posts we have discussed of the importance of social media in recent years. Social Media are the valuable carrier to disclose political decisions taken by central governments. This is well known to the main strategist of governments such as Russia, the country where a massive cyber repressive action was carried out […]
During the last year we have seen the consolidation of the tendency to use social media as a major vector for the exchange of information. The imperative is to be social, no matter if you need to share photos with friends or to express an opinion on a topic of social interest. Over the past […]
Over the last few months there have been different events that led to the story than they can be dangerous attacks on SCADA systems used to control production processes in industrial plants of various kinds, from industrial production to the provision of electricity supply or water. The concern is high, it could materialize the nightmare […]
With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether software piracy is deliberate or not, it is still illegal and punishable by law. We distinguish several type of software privacy: End user: sing one licensed copy to install a program on multiple computers,copying distrubuting […]
It’s end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what else will we remember of this 2011? No doubts, we will remember the new way to use Internet, an irreplaceable vector for social protests, expression of social malaise and of too much stolen liberty. We […]
In recent weeks we have learned of a dialer able to track our movements, spy on our communications, read our SMS … the privacy of millions of users has been violated! A disturbing application, multi-platform, which had not been reported previously. The news is troubling because it puts into serious consideration the privacy rights of […]
With the term of Mosaic theory we refer the method used in security analysis to gather information about a corporation. A natural extension of the method hit its application to ordinary life. Mosaic theory involves collecting information from different sources, public and private, to calculate the value of security. The key concept is the collection and […]
In this article I wish to bring to your attention what I regard as gross contradiction of a nation whose people I admire for their professionalism and dedication to work, India. In my previous article “Cyber India” lights and shadows of the country full of contradictions I presented a picture of the nation in terms of cyberwarfare, […]
In recent weeks we have discussed a lot about cyber crime and how it is assuming frightening proportions. A growing business in which a huge number of organizations have taken an interest. The cyber space considered as an open ocean in which there is anarchy and it is relatively the mob began to invest in […]
In this article I intend to read with you an interesting document, distributed by Imperva, in which they emphasized, the main threats that could cause significant problems in the coming year. Please carefully read the entire article, first we discuss the nine threats that worry Imperva, then I will introduce the most dangerous threats from my point of view. Do not spend days where you do not hear of cyber threats, risks and possible defense strategies implemented. Governments but […]