social networking

Facebook FBStalker tool uses Graph Search for powerful OSINT analysis

Experts Werrett and Lee demonstrated how to conduct a powerful analysis using FBStalker, a tool created to find a comprehensive…

11 years ago

Africa – Cybercrime has turned the web as a hub of evil

Africa is becoming even more an "online continent" despite its economical difficulties, in the same time there is a growing…

11 years ago

Critical Facebook vulnerability allows account hacking

Security expert Dan Melamed discovered a critical Facebook vulnerability would allow an attacker to take complete control over any account.…

11 years ago

US Air Force notice on military use of social media

US Air Force published a notice that includes a paragraph on the use of  social media platforms for computer network…

11 years ago

Facebook compromised by zero-day Java exploit

In this last months we have registered numerous clamorous attacks against intelligence agencies, government offices, media and social networking platforms.…

11 years ago

Iran and India, control and monitoring of networks

The news is circulating for days, the Iranian head of the national security forces , Esmail Ahmadi Moghadam, declared that…

11 years ago

Malware,Botnet & cyber threats,what is happening to the cyberspace?

Article published on Hakin9 IT Security Magazine "Raspberry Pi Hacking – Exploiting Software" 08/12 The article proposes an analysis of…

12 years ago

Pierluigi Paganini at Cyber Threat Summit 2012

Cyber Threat Summit 2012 - 20th & 21th Dublin   Pierluigi Paganini presents "The rise of cyber weapons and relative…

12 years ago

2012 Norton Cybercrime report, a worrying scenario

Here we are with the regular appointment with Symantec and its report on cybercrime " The yearly Norton Cybercrime report",…

12 years ago

This website uses cookies.