New forms of cyber-attacks

The Symantec anti-virus software company recently confirmed that, cyber-attacks worldwide have increased by 42% in 2012. This increase is due to both techniques used by criminals getting much diversified and by hackers taking advantage of both individuals and businesses users carelessness. Thus, attacks on small businesses have been multiplied by three in 2012. With the

Read More...

Behind the scenes of Cybercrime business

A recent study shows that cybercrime business today has become quite an organised field, with executives, managers and workers who depend on a variety of service providers to keep the illegal operations running. The 2013 Cybercrime Report from Fortinet explains on such arena of criminal organisations either competing with each other to find and hire

Read More...

Big data & big brother

 The democratization of broadband Internet requires daily discharges of billions of data on the Internet, whether video, images, sounds, text, data…. submitted by individuals, companies and even government agencies. This is what we call the “big data”, a term that implies a bit of marketing but explains a reality: the amount of data sent, received

Read More...

China monitoring Skype conversations

Skype is one of the most popular services for chat and phone conversations over the Internet, appealing to 250 million monthly connected users: it is a great way to keep contacts with friends and family but also business contacts based far or even abroad. But in China, people’s phone and chat conversations in Skype can

Read More...

Stay anonymous on the Internet

Every day, millions of people connect to Facebook and Twitter, do shopping online or comment on articles on news websites and want to stay anonymous. These activities became quite common but leave traces and the user does not always measure the consequences of this: some personal information, such as the age, address and shopping habits are

Read More...

VPN Invisibility is becoming a Must

To browse through the Internet from a ‘virtual private network’ or VPN for short, is like wearing a cloak of invisibility. There are a number of top-notch Internet browsing applications, especially constructed to make the surfer as safe as possible when using the Web. When employees access the Internet in their organisational roles, they are

Read More...