In this article I intend to read with you an interesting document, distributed by Imperva, in which they emphasized, the main threats that could cause significant problems in the coming year. Please carefully read the entire article, first...
In this article I intend to read with you an interesting document, distributed by Imperva, in which they emphasized, the main threats that could cause significant problems in the coming year. Please carefully read the entire article, first...
Have you ever wondered what are the main threats have concerns the banks and financial institutions? Several survey have been conducted and apart small differenced of on numbers they all have evidenced that Top fraud threats are payment card fraud check...
Are you able to imagine a world in which everybody is free to communicate without being intercepted, spied on, tracked? Have you ever dreamt, reading sad and bad news pages on the censure of many governments, a world where the concept of freedom of thought...
During this days I had the opportunity to read the results of a couple of surveys: The PricewaterhouseCoopers (PwC). Its Global Economic Crime Survey has demonstrated that Cybercrime has double digit growth being today third biggest crime...
Social Network Poisoning term refers the effect produced by the application of methods designed to make unreliable the knowledge related to a profile and its relationships. "Be Social" is the imperative of the last years. We live alternative lives, we...
If we talk about security which could be our worst nightmare? My answer is "to be vulnerable in every moment of our day, whatever we are doing and wherever we are" How could this happen? Imagine that someone has installed an app on our phones, and he is able...
Let we use these ingredients to start some serious reflection on safety issues related to mobile devices: Robust growth in the mobile market, accompanied by technological advances that have made these devices real PC. No awareness of those...
Cryptome, known as Wikileaks’s competitor site has published online several reserved documents revealing that the police have access to information of social networks. The documents describe how the police is able to access to Facebook user...
F-Secure Researchers have discovered a digitally signed malware that has code signed with a stolen government certificate belonging to the Malaysian Agricultural Research and Development Institute. The issue has long been known and this attack methodic...
In recent years social networks have succeeded in the historic feat of bringing to the web a growing number of users. Jupiter users, the elderly, individuals and businesses all within the large network, many, too much, share the total...
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.