vulnerabilities

Visit the front pageVisit your profilePublish a blog post

Malware... It’s all about you...

Article published on The Malta Indipendent

by Ron Kelson - Vice Chair ICT Gozo Malta Project, Pierluigi Paganini – Director and CISO of Bit4ID, Italy and Benjamin Gittins - CTO Synaptic Laboratories Ltd.

The military strategist Carl von Clausewitz stated:

“All war presupposes human weakness and seeks to exploit it.”

Malicious software (malware) is software that is explicitly designed to exploit vulnerabilities in computing devices and human users to the malicious advantage of the malware author or malware user. Malware comes in many forms, including computer viruses, worms, trojan, spyware, ransom-ware, ad-ware, root kits, and so on.

Are your business operations secure?

 

Article published on The Malta Indipendent

by Ron Kelson, Pierluigi Paganini, David Pace, Ben Gittins

Today, the chief executive officers (CEOs) of many businesses are becoming aware of the need to ensure their IT systems are secured to protect their organisation, their customers, and their stakeholders. According to Brian Snow, former technical director of the US NSA’s Information Assurance Directorate:

The Unknowns, hacker's revenge in the name of security

It's happened, another group of hacker named The Unknowns has hacked several organizations, , including NASA and the U.S. Air Force, and posted evidence of their actions.

Flashback Trojan, a business opportunity for all

 

Presentation: Securing Indian Cyberspace

The Indian Institute of Information Technology from Allahabad has provided a presentation about v

Vulnerabilities in some SCADA server softwares

 Vulnerabilities in some SCADA server softwares