The charge is heavy, according to some experts, Nokia analyzes userâs traffic officially to increase performance compressing data on some of its mobile devices. According many experts the popular company is responsible of the hijacking of userâs traffic on its servers, that is the case for the Nokia Asha models, for this reason on internet […]
During 2009 it was revealed that one of the primary defense contractor BAE Systems was hacked causing the exposure of sensible information on F-35 fighter jet. The reserved information were obtained by a group of hackers who accessed to internal server of the contractor, but BAE Systems admitted it only in 2012. The attackers were […]
Article published on The Malta Indipendent on December 9th 2012 Technology in the last decade has assumed a fundamental role in our daily lives. We are increasingly surrounded by discrete intelligent components designed to provide us with more sophisticated choices designed to enhance our personal experience and quality of life. From our phones, to our home […]
No peace for mobile environment that due its impressive increase is attracting cyber criminals and hackers like never before. The researcher Atul Alex has presented at last edition of International Malware Conference (MalCon) how it is possible to attack every mobile devices with a special hardware designed using common electronic components. Atul Alex presented a […]
Today a colleague alerted me on a news published on-line related to a patent obtained by Microsoft titled “CONTENT DISTRIBUTION REGULATION BY VIEWING USER” The patent could, according to some experts, a clear violation of privacy because it uses technology to gather information on user’s consumption of video content. The major concerns are related to […]
Trend Micro has released the report “3Q 2012 SECURITY ROUNDUP -Android Under Siege: Popularity Comes at a Price” that presents a worrying trend for malware growth increased of 483%. The increment include cyber espionage malware and also destructive malicious agents targeting mainly the mobile world and in particular Google Android platform. Malware targeting Android platform increased […]
We have often discussed the fact that governments and intelligence agencies regularly use tools to spy on communications and navigation data of millions internet users. The market monitoring is a thriving market, where revenue opportunities are high and where demand is far outstripping supply. Malware, backdoors, appliances are just some of the solutions used to […]
Article published on The Malta Indipendent by Ron Kelson – Vice Chair ICT Gozo Malta Project, Pierluigi Paganini â Director and CISO of Bit4ID, Italy and Benjamin Gittins – CTO Synaptic Laboratories Ltd. Mobile phones were once the status symbols of high-flying business executives. Today, mobile phones have become an essential part of our day-to-day lives. […]
This time target of attacks of the Anonymous group is the Australian government, at least 10 websites were taken down to protest proposed changes to privacy laws. The government want to force national ISP to spy on users make available their information to law enforcement and security agencies. The Anonymous Australia collective in a mail […]
We daily assist to continuous violations to user’s privacy, mobile apps that expose its data, communication channels apparently secure that reveals law enforcement interferences or network devices suspected to contains a secret backdoor. The imperative is the monitoring of users, for commercial and national security purposes, we have read in many occasions of the development […]