January 2012 Cyber Attacks Timeline (Part 1)

Click here for part 2. New year, new Cyber Attacks Timeline. Let us start our Information Security Travel in 2012

Read more

Fake Leaked Memos And Closed BackDoors

From an Information Security perspective this 2012 has begun with (too) many meaningful events, among which the most resounding so far, has been the alleged leak of portions of the source code belonging to several consumer and enterprise product by Symantec, a leading security vendor.... Read More

Read more
%d bloggers like this: