Several times in these posts we have discussed of the importance of social media in recent years. Social Media are…
During the last year we have seen the consolidation of the tendency to use social media as a major vector…
Over the last few months there have been different events that led to the story than they can be dangerous…
With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether…
It's end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what…
In recent weeks we have learned of a dialer able to track our movements, spy on our communications, read our…
With the term of Mosaic theory we refer the method used in security analysis to gather information about a corporation.…
In this article I wish to bring to your attention what I regard as gross contradiction of a nation whose…
In recent weeks we have discussed a lot about cyber crime and how it is assuming frightening proportions. A growing…
In this article I intend to read with you an interesting document, distributed by Imperva, in which they emphasized, the main threats that could cause significant problems in the coming year. Please…
This website uses cookies.