social networks

Hackers, a need for cyber security

Ten years, that is the time interval that has totally changed the worldwide perception for the role of hacker, these…

13 years ago

Hacktivism and web monitoring in 2013 for Security Affairs

The year is ending and it’s very easy to read forecast for next year, experts are sure that we will…

13 years ago

Android malware for SMS spam botnet

Everywhere is possible to read rivers of words on the impressive diffusion of social networks and mobile devices, both technologies…

13 years ago

The Facebook engagement in the fight against botnets with FBI

Social networks are platforms that have monopolized majority of user’s internet experience, the imperative is to “social”, and everybody share…

13 years ago

Sophos Security Threat Report 2013, today … tomorrow

Sophos was one of the first security firms that has published a report, Sophos Security Threat Report 2013, on current…

13 years ago

Data theft and computer scams, Merry Christmas

The large diffusion of new services on mobile platforms and social networks was accompanied with a sensible increase of cyber…

13 years ago

Russia deploys a massive surveillance network system

Last year I wrote about a new powerful surveillance system that Russian government committed to private business to implement a…

13 years ago

Why humans could be the weakest link in cyber security chain?

Last month I attended the Cyber Threat Summit in Dublin and I had the opportunity to assist to the interesting…

13 years ago

CleanIT project, concerns for a global surveillance project

I'm just returned from the Cyber Threat Summit in Dublin, one of the most interesting European events in cyber security…

13 years ago

Part 1: Authentication Series – A world of passwords

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our previous articles we…

13 years ago

This website uses cookies.