Monthly Archives: May 2013

Two-factor authentication, necessary but not sufficient to be safe

By Pierluigi Paganini, Editor-in-Chief, CDM May 31, 2013, 11:30 am EST Adoption of a two-factor authentication process…

Watering hole attacks and exploit kits – Indian gov site case

By Pierluigi Paganini, Editor-in-Chief, CDM May 30, 2013, 11:30 am EST Number of Watering hole attacks is…

New wave of cyber attacks from Iran hit US

By Pierluigi Paganini, Editor-in-Chief, CDM May 29, 2013, 04:30 pm EST New cyber attacks from Iran hit…

US critical infrastructures under unceasing cyber attacks

By Pierluigi Paganini, Editor-in-Chief, CDM May 28, 2013, 11:30 am EST US Congressmen Ed Markey and Henry…

Cost of cybercrime for UK Small Businesses

By Pierluigi Paganini, Editor-in-Chief, CDM May 27, 2013, 11:15 am EST The Federation of Small Businesses issued…

Operation Hangover, the Indian Cyberattack Infrastructure

By Pierluigi Paganini, Editor-in-Chief, CDM May 24, 2013, 11:30 am EST Operation Hangover is the title of…

LEVERAGING REFERENTIAL DATA FOR BETTER THREAT DETECTION

By Joe Magee, Chief Technology Officer, Vigilant, Inc. May 24, 2013, 11:30 am EST Security Information and…

Zero-day market, the governments are the main buyers

By Pierluigi Paganini, Editor-in-Chief, CDM May 22, 2013, 11:30 am EST Governments, and in particular US one,…

Google Company’s Surveillance Database hacked by same hackers who hit BigG in 2010

By Pierluigi Paganini, Editor-in-Chief, CDM May 22, 2013, 11:30 am EST Google data breach is reality and…

Nir Goldshlager reveals how to hack Facebook Apps

By Pierluigi Paganini, Editor-in-Chief, CDM May 21, 2013, 11:30 am EST The popular security expert Nir Goldshlager…

Show Buttons
Hide Buttons