monitoring

Anonymous,from OpTrialAtHome to the streets,is time for changing

Another Saturday, another round, as announced today the group Anonymous has targeted government sites to protest against British government policy. Nothing…

14 years ago

Anonymous, its strategy against censorship and the diversionary theory

Groups of hacktivist like Anonymous are the actual news of the global technology landscape, a new force with which and…

14 years ago

Social networks & Deactivated Friend Attack, the cybercrime paradise

A few days ago I wrote about the dangers relating to a not careful attendance of social networks, powerful platforms…

14 years ago

China again victim of cyber attacks

We have always been accustomed to reading incursions of Chinese cyber army into networks belonging to foreign private companies and government institutions.…

14 years ago

Surgical malware attack agains US via Iran

Sometimes warfare operation and cyber crime are really difficult to distinguish, especially when the cyber scenario is related to country that…

14 years ago

Why consider an enemy Iran and not Russia?

There is no doubt that through the analysis of the operations of a State in cyber space it is possible…

14 years ago

Spying on Facebook and not only, it’s emergency

A few days ago I wrote an article on cyber espionage and its higher incidence in the computer crimes. What…

14 years ago

Monitoring or censorship? The big fear

Published on The Hacker News Magazine - March 2012 During the last years we have seen the tendency to use social media as…

14 years ago

Google code used to circumvent privacy protections … true or false?

The Wall Street Journal in recent days has published a report on the activities of the Google company against Apple's…

14 years ago

Social Media, exercise or not exercise the control

Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and…

14 years ago

This website uses cookies.