• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Russia-linked Fronton botnet could run disinformation campaigns
  • A flaw in PayPal can allow attackers to steal money from users' account
  • Cytrox's Predator spyware used zero-day exploits in 3 campaigns
  • Threat actors target the infoSec community with fake PoC exploits
  • Security Affairs newsletter Round 366 by Pierluigi Paganini
  • North Korea-linked Lazarus APT uses Log4J to target VMware servers
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Social Networks (Page 30)

Social Networks

Social Network Poisoning … they want to spy on us, we evade

Social Network Poisoning term refers the effect produced by the application of methods designed to make unreliable the knowledge related to a profile and its relationships. "Be Social" is the imperative of the last years. We live alternative lives, we...

December 2, 2011  By Pierluigi Paganini   Posted In  Digital ID  Hacking  Intelligence  Security  Social Networks 

Assange, Spy Files and uncomfortable truths

If we talk about security which could be our worst nightmare? My answer is "to be vulnerable in every moment of our day, whatever we are doing and wherever we are" How could this happen? Imagine that someone has installed an app on our phones, and he is able...

December 2, 2011  By Pierluigi Paganini   Posted In  Digital ID  Hacking  Intelligence  Laws and regulations  Security  Social Networks 

Cryptome, social networks and the inconvenient truth

Cryptome, known as Wikileaks’s competitor site  has published  online several reserved documents revealing that the police have access to information of social networks.  The documents describe how the police is able to access to Facebook user...

November 28, 2011  By Pierluigi Paganini   Posted In  Digital ID  Hacking  Intelligence  Laws and regulations  Security  Social Networks 

The business of Censorship. Golden Shield Project, but not only …

""If you open the window for fresh air,  you have to expect some flies to blow in" this is the Deng Xiaoping’s phrase, which summarizes the essence of the "Golden Shield Project" also Known as the "Great Firewall of China". The project is...

November 19, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Social Networks 

Social Network “in-security”

In recent years social networks have succeeded  in the historic feat of bringing to the web a growing number of users. Jupiter users, the elderly, individuals and businesses all within the large network, many, too much, share the total...

November 17, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Digital ID  Hacking  Intelligence  Malware  Social Networks 

Public Tender for an Internet Content Monitoring System, really strange.

Few days ago I have partecipated to an open discussion started by Stefano Mele, a security  and cyber-terrorism expert, on the development of Internet Content Monitor System by the Soviet government. In April, the "Russian Federal Service...

November 13, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Social Networks 

Malicious attacks on Facebook

Let me share with you the paper “A study of malicious attacks on Facebook” presented by Robert Sandilands during the event VB2011 that was held from October the 3rd till the 7th in Barcelona, Spain. A well made summary on the main attacks on a social...

November 5, 2011  By Pierluigi Paganini   Posted In  Malware  Social Networks 

CIA Admits It Monitors, Analyzes Facebook, Twitter

As always support social networks are now the ideal carrier for an abnormal amount of information and this is the main reason why many governments have invested and are investing in sophisticated analysis tools that can implement intelligent...

November 5, 2011  By Pierluigi Paganini   Posted In  Intelligence  Social Networks 

The Socialbot Network

Online Social Networks(OSN) are an integral part of today's Web.  Hacktivist,Politicians, celebrities, revolutionists, and others use OSNs as carrier for their message to a wide audience. The downside is that these powerful tools can be used to spread disinformation...

November 2, 2011  By Pierluigi Paganini   Posted In  Social Networks 

Welcome on board

Welcome on board Welcome! If you are curious, interested in the subject and looking for a place with a few clicks you canbe updated on what happens in the world … well you you’ve found it. I read news and comments from everywhere on...

November 1, 2011  By Pierluigi Paganini   Posted In  Malware  Social Networks 


« First‹ Previous2627282930
Page 30 of 30



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT