This time target of attacks of the Anonymous group is the Australian government, at least 10 websites were taken down to protest proposed changes to privacy laws. The government want to force national ISP to spy on users make available their information to law enforcement and security agencies. The Anonymous Australia collective in a mail […]
We daily assist to continuous violations to user’s privacy, mobile apps that expose its data, communication channels apparently secure that reveals law enforcement interferences or network devices suspected to contains a secret backdoor. The imperative is the monitoring of users, for commercial and national security purposes, we have read in many occasions of the development […]
Last week a saw a satellite image taken by Google Earth related to a mysterious vehicle, apparently an unmanned aerial vehicle (UAV), parked at Lockheed Martinâs Skunk Works facility in Palmdale, California. âSkunk Worksâ LMâs Advanced Development Program Facility is where some of the most futuristic and secret projects are developed. The image was dated […]
The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines. According several researches the principal search engines index only a small portion of the overall web content, the remaining part is unknown to the majority of web users. What do you […]
The NFC technology Near field communication (NFC) is a set of standards for Smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity. The standard describes a radio technology that allows two devices to communicate at a short distance, no more than a few centimeters, allowing the exchange of […]
The massive use of new technologies has often raised thorny questions about the privacy of network users. The most difficult issue to resolve in the necessary to reach a compromise to assure the users requirements of security and privacy. The debate generates heated arguments, confusion and sometimes decisions in apparent contrast. In Japan, to the multinational […]
The news is sensational and is associated with the imminent spread of the new operating system from Microsoft, Windows 8. The Redmond has announced in its systems the presence of a “kill switch” feature, a system that allows the company to remotely access the terminal to proceed with the killing of processes that could cause […]
The Wall Street Journal in recent days has published a report on the activities of the Google company against Apple’s users using the Safari browser installed on all products of the company (Mac, iPhone and iPad). It was discovered a mechanism by which Google traced and memorized every online user’s action through cookies, circumventing the […]
What I want to discuss today is the interference of governments in what should be the private business and what are the consequences of an attitude so invasive. The news of this hour is that Nokia, RIM and Apple have provided to the Indian government, particularly its militia, a backdoor that provides the ability to control […]
In recent weeks we have learned of a dialer able to track our movements, spy on our communications, read our SMS … the privacy of millions of users has been violated! Â A disturbing application, multi-platform, which had not been reported previously. The news is troubling because it puts into serious consideration the privacy rights of […]