• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • A malvertising campaign targets iPhone users with Krampus-3PC
  • Rooster Teeth Productions suffered a payment card breach
  • New Orleans hit by ransomware, US cities continues to be under attack
  • Flaws in Siemens SPPA-T3000 control system expose power plants to hack
  • SEC Charges Shopin Founder with fraud over unregistered $42M ICO
  • A flaw in outdated versions of Beaver Builder and Elementor plugins allows hacking WordPress sites
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "The Guardian"

The Guardian

There is a second Snowden in the US intelligence, which is leaking classified data

Citizenfour, the new film on Edward Snowden, shows journalist Greenwald...

October 12, 2014  By Pierluigi Paganini

Vodafone admits support to state surveillance

Vodafone has recently issued the Law Enforcement Disclosure Report to revealĀ the...

June 6, 2014  By Pierluigi Paganini

Microsoft provided encrypted messages key and Skype calls access to NSA

The guardian issued new top secret documents gathered by Edward Snowden...

July 13, 2013  By Pierluigi Paganini

Operation Tempora, massive tapping program conducted by Britain’s GCHQ

Operation Tempora, is the name of GCHQ program to tapĀ fibre-optic cables...

June 23, 2013  By Pierluigi Paganini




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled