• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • FreakOut botnet target 3 recent flaws to compromise Linux devices
  • Vishing attacks conducted to steal corporate accounts, FBI warns
  • OpenWRT forum hacked, intruders stole user data
  • 500K+ records of C-level people from Capital Economics leaked online
  • Apple paid a $50,000 bounty to two bug bounty hunters for hacking its hosts
  • Rob Joyce is the new NSA Cyber Director
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Social Networks (Page 28)

Social Networks

Assange, Spy Files and uncomfortable truths

If we talk about security which could be our worst nightmare? My answer is "to be vulnerable in every moment of our day, whatever we are doing and wherever we are" How could this happen? Imagine that someone has installed an app on our phones, and he is able...

December 2, 2011  By Pierluigi Paganini   Posted In  Digital ID  Hacking  Intelligence  Laws and regulations  Security  Social Networks 

Cryptome, social networks and the inconvenient truth

Cryptome, known as Wikileaks’s competitor site  has published  online several reserved documents revealing that the police have access to information of social networks.  The documents describe how the police is able to access to Facebook user...

November 28, 2011  By Pierluigi Paganini   Posted In  Digital ID  Hacking  Intelligence  Laws and regulations  Security  Social Networks 

The business of Censorship. Golden Shield Project, but not only …

""If you open the window for fresh air,  you have to expect some flies to blow in" this is the Deng Xiaoping’s phrase, which summarizes the essence of the "Golden Shield Project" also Known as the "Great Firewall of China". The project is...

November 19, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Social Networks 

Social Network “in-security”

In recent years social networks have succeeded  in the historic feat of bringing to the web a growing number of users. Jupiter users, the elderly, individuals and businesses all within the large network, many, too much, share the total...

November 17, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Digital ID  Hacking  Intelligence  Malware  Social Networks 

Public Tender for an Internet Content Monitoring System, really strange.

Few days ago I have partecipated to an open discussion started by Stefano Mele, a security  and cyber-terrorism expert, on the development of Internet Content Monitor System by the Soviet government. In April, the "Russian Federal Service...

November 13, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Social Networks 

Malicious attacks on Facebook

Let me share with you the paper “A study of malicious attacks on Facebook” presented by Robert Sandilands during the event VB2011 that was held from October the 3rd till the 7th in Barcelona, Spain. A well made summary on the main attacks on a social...

November 5, 2011  By Pierluigi Paganini   Posted In  Malware  Social Networks 

CIA Admits It Monitors, Analyzes Facebook, Twitter

As always support social networks are now the ideal carrier for an abnormal amount of information and this is the main reason why many governments have invested and are investing in sophisticated analysis tools that can implement intelligent...

November 5, 2011  By Pierluigi Paganini   Posted In  Intelligence  Social Networks 

The Socialbot Network

Online Social Networks(OSN) are an integral part of today's Web.  Hacktivist,Politicians, celebrities, revolutionists, and others use OSNs as carrier for their message to a wide audience. The downside is that these powerful tools can be used to spread disinformation...

November 2, 2011  By Pierluigi Paganini   Posted In  Social Networks 

Welcome on board

Welcome on board Welcome! If you are curious, interested in the subject and looking for a place with a few clicks you canbe updated on what happens in the world … well you you’ve found it. I read news and comments from everywhere on...

November 1, 2011  By Pierluigi Paganini   Posted In  Malware  Social Networks 


« First‹ Previous2425262728
Page 28 of 28



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.