monitoring

Mac malware detected by Appelbaum at Oslo Freedom ForumMac malware detected by Appelbaum at Oslo Freedom Forum

Mac malware detected by Appelbaum at Oslo Freedom Forum

NEW MAC MALWARE HAS BEEN DISCOVERED BY JACOB APPELBAUM ON ATTENDEE COMPUTER AT OSLO FREEDOM FORUM WHERE IS DEBATED ALSO GOVERNMENT SURVEILLANCE. A new…

12 years ago
Microsoft Skype accused of supporting the surveillance in ChinaMicrosoft Skype accused of supporting the surveillance in China

Microsoft Skype accused of supporting the surveillance in China

In many occasion we have discussed about the consequences of monitoring activities on internet and communication channels operated by governments…

12 years ago
Stylometric analysis to track anonymous users in the undergroundStylometric analysis to track anonymous users in the underground

Stylometric analysis to track anonymous users in the underground

Law enforcement and intelligence agencies conscious of the high risks related to cyber threats have started massive monitoring campaign, everything…

12 years ago
SkypeHide system, steganography to secure communications on SkypeSkypeHide system, steganography to secure communications on Skype

SkypeHide system, steganography to secure communications on Skype

In this period there is an intense debate on the wiretapping of every communication channel, governments are increasing the monitoring…

13 years ago
Iran and India, control and monitoring of networksIran and India, control and monitoring of networks

Iran and India, control and monitoring of networks

The news is circulating for days, the Iranian head of the national security forces , Esmail Ahmadi Moghadam, declared that…

13 years ago
Hacktivism and web monitoring in 2013 for Security AffairsHacktivism and web monitoring in 2013 for Security Affairs

Hacktivism and web monitoring in 2013 for Security Affairs

The year is ending and it’s very easy to read forecast for next year, experts are sure that we will…

13 years ago
US develop exploitation methods for mobile devices while refuse UN treatyUS develop exploitation methods for mobile devices while refuse UN treaty

US develop exploitation methods for mobile devices while refuse UN treaty

Just one week ago a UN treaty was approved to update 24-year-old United Nations telecommunications rules. The agreement states that…

13 years ago
Russia deploys a massive surveillance network systemRussia deploys a massive surveillance network system

Russia deploys a massive surveillance network system

Last year I wrote about a new powerful surveillance system that Russian government committed to private business to implement a…

13 years ago
Cyber security landscape in AfricaCyber security landscape in Africa

Cyber security landscape in Africa

Let me present you a very interesting study on cyber security landscape in Africa, conducted by IDG Connect, division of International…

13 years ago
The Deep Web Part 1: Introduction to the Deep Web and how to wear clothes online!The Deep Web Part 1: Introduction to the Deep Web and how to wear clothes online!

The Deep Web Part 1: Introduction to the Deep Web and how to wear clothes online!

Article published on The Malta Indipendent on October 14th 2012 Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins  …

13 years ago