surveillance

Why humans could be the weakest link in cyber security chain?

Last month I attended the Cyber Threat Summit in Dublin and I had the opportunity to assist to the interesting…

13 years ago

CleanIT project, concerns for a global surveillance project

I'm just returned from the Cyber Threat Summit in Dublin, one of the most interesting European events in cyber security…

13 years ago

DaVinci code,the surveillance business & eligibility of investigations

No doubts, one of the most advanced cyber threat to the technological evolution is the malware diffusion, we read daily…

14 years ago

Reuters blogging platform hacked, the critical role of information

In this day my blog has dedicated a great attention to the security of social media, explaining the importance of…

14 years ago

Syria Files, Wikileaks, Anonymous and dirty affairs

Big outcry on Wikileaks that last week has published more that 2.4 million emails allegedly obtained from continuous hack against…

14 years ago

Social Media, exercise or not exercise the control

Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and…

14 years ago

India, inadequate laws, wrong policies and the hazard of regression

India, a nation technologically advanced, of which we have so much discussed in recent weeks. We have discussed about the…

14 years ago

Rim, Nokia and Apple. Monitoring, interferences and violated privacy

What I want to discuss today is the interference of governments in what should be the private business and what…

14 years ago

This website uses cookies.