security

SCADA and critical infrastructures, in … security

According last report published by The European Network and Information Security Agency (ENISA)   “ENISA Threat Landscape – Responding to the…

13 years ago

Zero-day vulnerability in Symantec PGP Whole Disk Encryption

IT community become familiar with the concept of zero-day vulnerability, no matter if it is related to SCADA system or…

13 years ago

The “Intelligent Objects” that surround us

Article published on The Malta Indipendent on December 9th 2012 Technology in the last decade has assumed a fundamental role in…

13 years ago

BitcoinCentral operates as bank,reflections from multiple perspectives

Virtual currency schemas, despite used by large communities, face with intrinsic instability that makes them not ideal for investments for…

13 years ago

Sophos Security Threat Report 2013, today … tomorrow

Sophos was one of the first security firms that has published a report, Sophos Security Threat Report 2013, on current…

13 years ago

CyberCop system, a russian project against cybercrime

This time I desire to speak about an interesting initiative of Group-IB company, a resident of the Moscow-based Skolkovo Foundation,…

13 years ago

New technologies raise serious doubts on privacy & security

Today a colleague alerted me on a news published on-line related to a patent obtained by Microsoft titled "CONTENT DISTRIBUTION…

13 years ago

The amazing growth of cybercrime

The cybercrime represents today one of the primary concerns on global scale, it is a growing industry that is impacting…

13 years ago

#AntiSecIT Analysis of the Anonymous Italian job

Last week I discussed with a friend on the risks related to attacks of the group Anonymous against strategic offices…

13 years ago

Trend Micro Q3 security report

Trend Micro has released the report "3Q 2012 SECURITY ROUNDUP -Android Under Siege: Popularity Comes at a Price" that presents…

13 years ago

This website uses cookies.