The group of Syrian Electronic Army hackers is intensification its hacking campaign pro-Assad. Details of the attacks against the HuffingtonPost…
The use of technologies to support censorship is deplorable and condemnable but it must be considered that is a sad…
Recently I wrote a post to describe the national blackout occurred is Syria, the event officially justified by the regime…
In this day my blog has dedicated a great attention to the security of social media, explaining the importance of…
Big outcry on Wikileaks that last week has published more that 2.4 million emails allegedly obtained from continuous hack against…
Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used…
We clarified the use of anonymizing networks is not only related to criminal intents, they represent in fact a…
Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of…
For years, we discuss the authorship of what is considered one of the most offensive cyber weapon of history, Stuxnet,…
Tor Metrics Cyber intelligence units are working to develop tools and applications for a deep inspection of the hidden web…
This website uses cookies.