Social Network

The malware factory

Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of…

14 years ago

Hacktivist vs Twitter, security of OAuth authorization

There isn’t peace for social network platforms, priority target for cybercrime and governments, they represent a mine of data useful…

14 years ago

LinkedIn passwords compromised.Social network poisoning & other risks

It's happened, today has been diffused the news that users’ passwords of the most famous business social network LinkedIn have…

14 years ago

Japan and the privacy contradictions

The massive use of new technologies has often raised thorny questions about the privacy of network users. The most difficult…

14 years ago

Millions US government email addresses in the hands of the cybercrime

It has repeatedly reiterated the need for a cyber strategy to reduce risks related to cyber threats from various sources,…

14 years ago

Syria, a massacre began on the web

Syria massacre shocks the world, syrian army has repeatedly bombed the protest city of Homs killing several hundred civilians. The images of…

14 years ago

Syria drama and impact on cyberspace

The situation in Syria aroused much concern in the world because it could trigger, in a highly unstable, a conflict…

14 years ago

Underestimate the threat, a serious error

In recent years it has fully understood the offensive capability of the use of cyber weapons, highly efficient tools to…

14 years ago

New Drive-By Spam Infects unsuspecting users

The threat arrives via email, is now read consuetidine attacks that use email as a vector for spreading malware. Until…

14 years ago

Zeus,software as a service – Implications for civil and military

As previously said the cyber crime industry is proving to be invoiced in a thriving company that knows no crisis.…

14 years ago

This website uses cookies.