Large scale infiltration

Why do we need hackers today?

In the last decade the role of hacker is deeply changed, these strange characters were once kept away from government…

12 years ago

Facebook, more than 83 million questionable profiles.The poisoned networks

Crazy ... a year ago on a warm June evening I began to formalize some ideas on a concept of…

12 years ago

Rakshasa, is it possible design the perfect hardware backdoor?

Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by…

12 years ago

Smart Phone Monitoring and Malware… Up close and personal…

Article published on The Malta Indipendent by Ron Kelson - Vice Chair ICT Gozo Malta Project, Pierluigi Paganini – Director and…

12 years ago

Who really takes advantage of the operations of Anonymous?

I desire to tribute another article to the group that catch the  worldwide attention of security community, Anonymous. Few years…

12 years ago

Hacktivist vs Twitter, security of OAuth authorization

There isn’t peace for social network platforms, priority target for cybercrime and governments, they represent a mine of data useful…

12 years ago

Flame malware, from genesis to the plot theory

In this article I desire to discuss about many personal doubts and beliefs regarding the Flame malware, first my idea…

12 years ago

China-made US military chip, security backdoor or debugging functionality?

During last days an insistent news circulated on the internet, a microchip used by the US military and manufactured in…

12 years ago

LinkedIN – Vulnerability in the authentication process and related risks

A serious vulnerability has been found in the authentication process of the popular network LinkedIN, the news published on the…

12 years ago

US vc China. Is cyber warfare gap increasing?

The Chinese offensive capabilities in cyberspace in this period are, more than ever, subject of great interest from the international…

12 years ago

This website uses cookies.