mobile

Understanding risks of different types of Mobile Banking transactionsUnderstanding risks of different types of Mobile Banking transactions

Understanding risks of different types of Mobile Banking transactions

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins   Many people are inclined…

13 years ago
DaVinci code,the surveillance business & eligibility of investigationsDaVinci code,the surveillance business & eligibility of investigations

DaVinci code,the surveillance business & eligibility of investigations

No doubts, one of the most advanced cyber threat to the technological evolution is the malware diffusion, we read daily…

13 years ago
Phishing the financial and banking seasPhishing the financial and banking seas

Phishing the financial and banking seas

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martins, David Pace and Benjamin Gittins Every day the international…

13 years ago
Malware… It’s all about you…Malware… It’s all about you…

Malware… It’s all about you…

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace The military strategist Carl von Clausewitz stated:…

13 years ago
DDoS attacks in Q2, do not underestimate the cyber threatDDoS attacks in Q2, do not underestimate the cyber threat

DDoS attacks in Q2, do not underestimate the cyber threat

In the first quarter I proposed the results of an analysis conducted by Prolexic firm on the incidence of DDoS…

13 years ago
A view on the economic impact of cyber attacks, from US to ChinaA view on the economic impact of cyber attacks, from US to China

A view on the economic impact of cyber attacks, from US to China

On June 28th, a FBI official declared before a House panel that the phenomenon of cyber espionage is increasing with…

13 years ago
McAfee Report on alarming growth of cyber threatsMcAfee Report on alarming growth of cyber threats

McAfee Report on alarming growth of cyber threats

I find really interesting the report released by security firms regarding the principal cyber threats and the related evolution. This…

13 years ago
Cyber threats in mobile environmentCyber threats in mobile environment

Cyber threats in mobile environment

Today I desire to share with you the results of a study of Trend Micro security firm focused on mobile…

13 years ago
Botnets and cyber warfare, a dangerous combinationBotnets and cyber warfare, a dangerous combination

Botnets and cyber warfare, a dangerous combination

The US Government is very close to the theme of warfare being among the countries that invest more in the…

13 years ago
Governments and gaming platforms, it’s time for warfareGovernments and gaming platforms, it’s time for warfare

Governments and gaming platforms, it’s time for warfare

The US government is financing several activities to investigate and hack into the technology spread in every device that ordinary…

13 years ago