mobile

How to turn any phone into a spy device with hardware hackHow to turn any phone into a spy device with hardware hack

How to turn any phone into a spy device with hardware hack

No peace for mobile environment that due its impressive increase is attracting cyber criminals and hackers like never before. The…

13 years ago
Data theft and computer scams, Merry ChristmasData theft and computer scams, Merry Christmas

Data theft and computer scams, Merry Christmas

The large diffusion of new services on mobile platforms and social networks was accompanied with a sensible increase of cyber…

13 years ago
F-Secure Mobile threat report Q3/2012, cyber threats in the etherF-Secure Mobile threat report Q3/2012, cyber threats in the ether

F-Secure Mobile threat report Q3/2012, cyber threats in the ether

F-Secure  security firm has recently published the “Mobile threat report Q3/2012” related the past quarter that presents the mobile threat…

13 years ago
The amazing growth of cybercrimeThe amazing growth of cybercrime

The amazing growth of cybercrime

The cybercrime represents today one of the primary concerns on global scale, it is a growing industry that is impacting…

13 years ago
Trend Micro Q3 security reportTrend Micro Q3 security report

Trend Micro Q3 security report

Trend Micro has released the report "3Q 2012 SECURITY ROUNDUP -Android Under Siege: Popularity Comes at a Price" that presents…

13 years ago
Why humans could be the weakest link in cyber security chain?Why humans could be the weakest link in cyber security chain?

Why humans could be the weakest link in cyber security chain?

Last month I attended the Cyber Threat Summit in Dublin and I had the opportunity to assist to the interesting…

13 years ago
PlaceRaider the 3D visual malware from military researchPlaceRaider the 3D visual malware from military research

PlaceRaider the 3D visual malware from military research

It's known that military sector represents a privileged incubator for new technologies than in many cases are subsequently used in…

13 years ago
Expected new wave of cyber attacks against bankingExpected new wave of cyber attacks against banking

Expected new wave of cyber attacks against banking

In these days it has been discussed about a possible Iranian cyber offensive against US banks immediately denied by government…

13 years ago
2012 Norton Cybercrime report, a worrying scenario2012 Norton Cybercrime report, a worrying scenario

2012 Norton Cybercrime report, a worrying scenario

Here we are with the regular appointment with Symantec and its report on cybercrime " The yearly Norton Cybercrime report",…

13 years ago
Malware, a cyber threat increasingly difficult to containMalware, a cyber threat increasingly difficult to contain

Malware, a cyber threat increasingly difficult to contain

Article published on Hakin9 IT Security Magazine - August 2012 When we speak about malware we introduce one of the…

13 years ago