Let we use these ingredients to start some serious reflection on safety issues related to mobile devices: Robust growth in the mobile market, accompanied by technological advances that have made these devices real PC. No awareness of those...
Let we use these ingredients to start some serious reflection on safety issues related to mobile devices: Robust growth in the mobile market, accompanied by technological advances that have made these devices real PC. No awareness of those...
Cryptome, known as Wikileaks’s competitor site has published online several reserved documents revealing that the police have access to information of social networks. The documents describe how the police is able to access to Facebook user...
The control of information is the main concern of Governments. More or less declared the major players of a precarious global economy have implemented digital surveillance systems, from India to China, passing Russia and USA. The crucial...
When I discussed with many colleagues regarding cloud paradigm most of them smiled declaring that we face yet another found marketing to sell a methodology, known for at least a decade, under new and more appealing clothes. Indeed many of the concepts...
In recent months it has had discussions about the possibility of blocking sites that somehow support the distribution of pirated software. How to identify these sites? How to find and block communications to the final users. The role of the ISPs is fundamental...
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.