Category Archives: 2023

Telegram and the information war in Ukraine

Telegram and the Information War in Ukraine

How Telegram Influences the Conflict between Russia and Ukraine Telegram and the information war in Ukraine are closely related. Telegram is a messaging app that offers users a secure and confidential way to communicate, thanks to its end-to-end encryption system. It has a large user base around the world, especially in Eastern Europe, where it […]

5Ghoul: 5G NR Attacks on Mobile Devices

5Ghoul: 5G NR Attacks on Mobile Devices

5Ghoul: How Contactless Encryption Can Secure Your 5G Communications from Modem Attacks 5Ghoul is a set of 5G NR vulnerabilities that affect Qualcomm and MediaTek modems. These flaws allow to launch denial-of-service attacks or degrade the quality of the 5G network. What is 5Ghoul? 5Ghoul is a set of 14 5G NR (New Radio) vulnerabilities, […]

The American Intelligence How It Works : Section 702

The American Intelligence: How It Works

The American Intelligence: How It Works, Its Limits and Consequences The American intelligence is one of the most powerful and influential in the world. It has a vast network of agencies, resources, and allies that enable it to collect, analyze, and act on information of strategic interest. However, the American intelligence also faces challenges and […]

New EU Data Protection Regulation 2023/2854: What you need to know

New EU Data Protection Regulation 2023/2854: What you need to know

What you need to know about the new EU data protection regulation (2023/2854) Personal data is a valuable asset in the digital age, but also a vulnerable asset. This is why the European Union has adopted a new regulation to protect the personal data of individuals in the EU. Data Protection Regulation (EU) 2023/2854 supplements […]

FormBook Malware: how to protect your gmail and other data

FormBook Malware: How to Protect Your Gmail and Other Data

How to Protect Your Gmail Account from FormBook Malware Introduction Imagine that you receive an email from your bank, asking you to confirm your identity by clicking on a link. You open the link, and you find yourself on a page that looks like your bank’s website, but it is actually a fake. You enter […]

Quantum computing RSA encryption

Quantum computing RSA encryption: a threat and a solution

Quantum computing RSA encryption: a challenge and a solution Quantum computing RSA encryption is a challenge for online security. Quantum computing is a new way of computing that uses quantum physics. It can do things that classical computers cannot or are too slow to do. One of these things is breaking RSA encryption, which secures […]

Cardokey NFC vCard Business: Edit, Read, and Import Contacts Seamlessly on iPhone.

NFC Business Cards with Cardokey free for life: How to Connect without Revealing

NFC Business Cards: Create your NFC vCard with Cardokey, the Eco-Friendly and Secure NFC App Are you looking for an eco-friendly way to create contactless business cards? Do you want to benefit from affordable NFC technology and prioritize privacy? You’ll love Cardokey – the app revolutionizing NFC business cards! Cardokey, the NFC business card that […]

Predator Files How a Spyware Consortium Targeted Civil Society Politicians and Officials

Predator Files: The Spyware Scandal That Shook the World

Predator Files: How a Spyware Consortium Targeted Civil Society, Politicians and Officials Cytrox: The maker of Predator File Predator File is a spyware that was developed by Cytrox, a company based in North Macedonia that specializes in cyber intelligence systems. Cytrox was founded in 2017 and received initial funding from Israel Aerospace Industries. It later […]

Pegasus The Cost of Spying with the Most Powerful Spyware

Pegasus: The cost of spying with one of the most powerful spyware in the world

Pegasus: The Cost of Spying with the Most Powerful Spyware in the World Pegasus is a spyware developed by the Israeli company NSO Group. It allows to remotely monitor the activities of a mobile phone. According to an investigation conducted by a consortium of international media, several countries have used this software to spy on […]