privacy

Researcher demonstrated serious flaw in Apple App Store

Once again the security of large scale application and platform is challenged, today is the turn of Apple, in particular…

12 years ago

Serious security flaws affect millions of HTC mobile devices

The news of those who make a lot of noise, more than 18 million devices commercialized by Taiwanese company HTC…

12 years ago

Nokia and the accusation of MITM attack

The charge is heavy, according to some experts, Nokia analyzes user’s traffic officially to increase performance compressing data on some…

12 years ago

Have you been hacked? … you must disclose it!

During 2009 it was revealed that one of the primary defense contractor BAE Systems was hacked causing the exposure of…

12 years ago

The “Intelligent Objects” that surround us

Article published on The Malta Indipendent on December 9th 2012 Technology in the last decade has assumed a fundamental role in…

12 years ago

How to turn any phone into a spy device with hardware hack

No peace for mobile environment that due its impressive increase is attracting cyber criminals and hackers like never before. The…

12 years ago

New technologies raise serious doubts on privacy & security

Today a colleague alerted me on a news published on-line related to a patent obtained by Microsoft titled "CONTENT DISTRIBUTION…

12 years ago

Trend Micro Q3 security report

Trend Micro has released the report "3Q 2012 SECURITY ROUNDUP -Android Under Siege: Popularity Comes at a Price" that presents…

12 years ago

Large-scale monitoring, few hours to identify file-sharers

We have often discussed the fact that governments and intelligence agencies regularly use tools to spy on communications and navigation…

12 years ago

Smart Phone Monitoring and Malware… Up close and personal…

Article published on The Malta Indipendent by Ron Kelson - Vice Chair ICT Gozo Malta Project, Pierluigi Paganini – Director and…

12 years ago

This website uses cookies.