What does the elapse of the document time mean

 
⤫ Kununu Ե Twitter /P. PayPal

SHORT MESSAGE

As an addition to the contents on this website we suggest all of our visitors to follow our Twitter channel. The account contains a variety of news topics in the field of cyber and information security. Some selected tweets from our account are also on this website.
The news service area contains various entries from drafts to news service reports. The articles below can be selected for a closer look.
A translation for this text is not available. Please select the English version.
At the end of 2014 the third ever published CSR, TRON-DELTA.ORG "Cyber ​​Security Report 2014", which was made available within this section. However as two years ago the 2014 report was also considered classified for legal and security reasons.

The CSR 2014 mainly covered the latest revelations in the intelligence sector also known as global surveillance disclosures (Wikipedia) by E. J. Snowden, G. Greenwald, L. Poitras and further individuals. Information on the present use of quantum computing and related technology like the NSA's Utah Data Center (ICCNCIDC) were also part of this CSR. Furthermore changes in malware development and new attack techniques especially in the field of human and social engineering were covered. The issue of ongoing problems with regards to GSM and UMTS security was also addressed within the report along with a coverage on the recent leak on the attack on Gemalto. The CSR also included a prediction of the most likely future developments in terms of transnational organizations in cyber crime as usual. Finally a bigger update on projects and future goals of TRON-DELTA.ORG was given.
Last updated (Wednesday April 1, 2015)
Saturday 1st December 2012
A translation for this text is not available. Please select the English version.
At the end of 2012 the second ever published CSR, TRON-DELTA.ORG "Cyber ​​Security Report 2012", will be made publicly available within this section. Until that time we suggest our readers to have a look at some different annual security reports, like the "BSI Management Report IT Security 2011".

Among other things the CSR will cover 2012's most discussed operating system and application flaws, and describe some mitigation strategies like BSD Capsicum in greater detail. Information on the present use of botnets in cloud computing plus related technology as a dominating factor, even confirmed by ENISA, will be part of the CSR as well. Furthermore identity fraud as a new playground with its sophisticated structures will be covered along with a note on the increased number of mobile devices under attack. Another section of the report will focus on the statement on cyber security from German CCC officials published in 2011. The CSR will also include a prediction of the most likely future developments in terms of transnational organizations in cyber crime. Along with that an appreciation of specific future cyber crime activities, regarding economic and technical aspects alike, will be attached to the report.
Last updated (Wednesday April 1, 2015)

LOGIN AREA

∗∗∗∗∗∗∗∗
∗∗∗∗∗∗∗∗