Large scale infiltration

Why do we need hackers today?Why do we need hackers today?

Why do we need hackers today?

In the last decade the role of hacker is deeply changed, these strange characters were once kept away from government…

13 years ago
Facebook, more than 83 million questionable profiles.The poisoned networksFacebook, more than 83 million questionable profiles.The poisoned networks

Facebook, more than 83 million questionable profiles.The poisoned networks

Crazy ... a year ago on a warm June evening I began to formalize some ideas on a concept of…

13 years ago
Rakshasa, is it possible design the perfect hardware backdoor?Rakshasa, is it possible design the perfect hardware backdoor?

Rakshasa, is it possible design the perfect hardware backdoor?

Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by…

13 years ago
Smart Phone Monitoring and Malware… Up close and personal…Smart Phone Monitoring and Malware… Up close and personal…

Smart Phone Monitoring and Malware… Up close and personal…

Article published on The Malta Indipendent by Ron Kelson - Vice Chair ICT Gozo Malta Project, Pierluigi Paganini – Director and…

13 years ago
Who really takes advantage of the operations of Anonymous?Who really takes advantage of the operations of Anonymous?

Who really takes advantage of the operations of Anonymous?

I desire to tribute another article to the group that catch the  worldwide attention of security community, Anonymous. Few years…

13 years ago
Hacktivist vs Twitter, security of OAuth authorizationHacktivist vs Twitter, security of OAuth authorization

Hacktivist vs Twitter, security of OAuth authorization

There isn’t peace for social network platforms, priority target for cybercrime and governments, they represent a mine of data useful…

13 years ago
Flame malware, from genesis to the plot theoryFlame malware, from genesis to the plot theory

Flame malware, from genesis to the plot theory

In this article I desire to discuss about many personal doubts and beliefs regarding the Flame malware, first my idea…

13 years ago
China-made US military chip, security backdoor or debugging functionality?China-made US military chip, security backdoor or debugging functionality?

China-made US military chip, security backdoor or debugging functionality?

During last days an insistent news circulated on the internet, a microchip used by the US military and manufactured in…

13 years ago
LinkedIN – Vulnerability in the authentication process and related risksLinkedIN – Vulnerability in the authentication process and related risks

LinkedIN – Vulnerability in the authentication process and related risks

A serious vulnerability has been found in the authentication process of the popular network LinkedIN, the news published on the…

13 years ago
US vc China. Is cyber warfare gap increasing?US vc China. Is cyber warfare gap increasing?

US vc China. Is cyber warfare gap increasing?

The Chinese offensive capabilities in cyberspace in this period are, more than ever, subject of great interest from the international…

13 years ago