Author: Pierluigi Paganini

Cyber Security Analyst; Member, European Union Agency for Network and Information Security Threat Landscape Stakeholder Group; Founder, Security Affairs Blog. Co-author of The Deep Dark Web: The Hidden World.

1 2 3 4 10 / 40 POSTS
Beginner’s guide to access the DarkNet and Deep Web

Beginner’s guide to access the DarkNet and Deep Web

It is true that there are a lot of different opinions out there, as to what the Deep Web and DarkNet are. Many people consider them to be the source o [...]
Security Mistakes and Exploitation of Mobile Apps

Security Mistakes and Exploitation of Mobile Apps

Security mistakes in mobile app development are quite common and can lead to the user’s mobile device being compromised and his or her data being mani [...]
Details about DROWN attacks and how to prevent them

Details about DROWN attacks and how to prevent them

A whopping 11.5M websites using the HTTPS protocol for encryption are estimated to be at the risk of being attacked and having their data compromised [...]
Android, Apple, BlackBerry: Which phone is more vulnerable to online threats?

Android, Apple, BlackBerry: Which phone is more vulnerable to online threats?

The FBI and Apple are currently awaiting court regarding a government request for a backdoor to the iPhone, which has been used by Syed RizwanFarook, [...]
2016 Apple security advances you must take note of

2016 Apple security advances you must take note of

If you are conscious about online security, it is prudent to say that you will be thrilled by the progress made on behalf of Apple in this field. In f [...]
2016 Internet of Things Predictions in a Nutshell For You

2016 Internet of Things Predictions in a Nutshell For You

The Internet of Things (aka IOT) has dominated the field of technology for many years now, and this means that it is high time to deal with this serio [...]
Creating Strong Passwords: Which Password Strategy is the Best?

Creating Strong Passwords: Which Password Strategy is the Best?

We always use passwords, since they pretty much define our online existence. This means that wherever we wish to enter, we have to think of the proper [...]
Don’t allow yourself to be spied on, take charge of your privacy

Don’t allow yourself to be spied on, take charge of your privacy

There are millions of surveillance equipment pieces in the world today. In the UK alone, there are over 6.1million surveillance cameras. Now, there is [...]
Spying on text messages remotely without having phone possible? Yes!

Spying on text messages remotely without having phone possible? Yes!

Text message monitoring is something that many people might desire for both good and bad reasons. Take an example of a parent who wants to make sure t [...]
Encryption; should governments have a way in?

Encryption; should governments have a way in?

Every time there is a major terrorist attack the governments involved are asked to look for clues that they missed and therefore the successful attack [...]
1 2 3 4 10 / 40 POSTS