mobile

Give me your mobile and I’ll tell you who you are!Give me your mobile and I’ll tell you who you are!

Give me your mobile and I’ll tell you who you are!

No doubt the last two years witnessed the true revolution in information technology world is the development and deployment of mobile…

13 years ago
Cyberespionage and new opportunities for cybercrimeCyberespionage and new opportunities for cybercrime

Cyberespionage and new opportunities for cybercrime

The continued technology push that is shaping our society during the last decade has brought an exponential increase in computer…

13 years ago

Banking sector under attack, are we ready to the challenge?

Where can I find money? At the bank of course, this is the thought which underlies dell'orietamento of cyber crime…

13 years ago
Critical infrastructures – Main threats for 2G and 3G mobile networksCritical infrastructures – Main threats for 2G and 3G mobile networks

Critical infrastructures – Main threats for 2G and 3G mobile networks

Which is the critical infrastructure of a country that is most exposed to cyber threat?  The question is difficult to…

14 years ago

2012, the threat of malware. Evolution in the mobile scenario

Wanting to try out hypotheses about the future of the spread of malware, we cannot help but examine the mobile…

14 years ago