What does the elapse of the document time mean
|⤫ Kununu Ե Twitter /P. PayPal|
As an addition to the contents on this website we suggest all of our visitors to follow our Twitter channel. The account contains a variety of news topics in the field of cyber and information security. Some selected tweets from our account are also on this website.
The news service area contains various entries from drafts to news service reports. The articles below can be selected for a closer look.
A translation for this text is not available. Please select the English version.At the end of 2014 the third ever published CSR, TRON-DELTA.ORG "Cyber Security Report 2014", which was made available within this section. However as two years ago the 2014 report was also considered classified for legal and security reasons.
The CSR 2014 mainly covered the latest revelations in the intelligence sector also known as global surveillance disclosures (Wikipedia) by E. J. Snowden, G. Greenwald, L. Poitras and further individuals. Information on the present use of quantum computing and related technology like the NSA's Utah Data Center (ICCNCIDC) were also part of this CSR. Furthermore changes in malware development and new attack techniques especially in the field of human and social engineering were covered. The issue of ongoing problems with regards to GSM and UMTS security was also addressed within the report along with a coverage on the recent leak on the attack on Gemalto. The CSR also included a prediction of the most likely future developments in terms of transnational organizations in cyber crime as usual. Finally a bigger update on projects and future goals of TRON-DELTA.ORG was given.
Last updated (Wednesday April 1, 2015)
Saturday 1st December 2012
A translation for this text is not available. Please select the English version.At the end of 2012 the second ever published CSR, TRON-DELTA.ORG "Cyber Security Report 2012", will be made publicly available within this section. Until that time we suggest our readers to have a look at some different annual security reports, like the "BSI Management Report IT Security 2011".
Among other things the CSR will cover 2012's most discussed operating system and application flaws, and describe some mitigation strategies like BSD Capsicum in greater detail. Information on the present use of botnets in cloud computing plus related technology as a dominating factor, even confirmed by ENISA, will be part of the CSR as well. Furthermore identity fraud as a new playground with its sophisticated structures will be covered along with a note on the increased number of mobile devices under attack. Another section of the report will focus on the statement on cyber security from German CCC officials published in 2011. The CSR will also include a prediction of the most likely future developments in terms of transnational organizations in cyber crime. Along with that an appreciation of specific future cyber crime activities, regarding economic and technical aspects alike, will be attached to the report.
Last updated (Wednesday April 1, 2015)
- What is Total Trailing Return
- What does landmine on the coast of Jersey mean
- Orzechowo Morskie Pole Namiotowe Brenna
- Vicks v966us how to switch to f
- Fake eyelashes wholesale vietnam
- When deciphering the body language, standardization is of crucial importance
- What does Tal deceased mean
- Raafat Mansour Toronto Doctor Who Convened
- How to break in Carhartt boots
- How do I create a test plan in Testopian
- Tom Vavra, how many hectares under cultivation
- Firebird column alias in the where clause
- Who is Vaudevillian Olsen
- Agent Romanoff you miss me when I am
- Resident Evil 3 Item Box everywhere
- What is an infoman
- Onkyo a 9070 what Hi-Fi headphones review
- Instructions for playing the vitalograph spirometer
- What does loan paper mean
- 4men villain east where
- Lisa howarth thai boxing
- What does postorbital occlusion mean
- How to Control Hunger During Master Cleansing
- What is Minyak Bumbu Gewuerzoel
- What does the latter mean?
- Where was Chriselda Lewis born of fire
- What does aut disce aut discede meaning
- How much do 0148 numbers cost
- What is Fricandeau Definition
- As you can see from looking for the Koran
- How to make fake quarters
- How to play Sylvia by focusing
- How Much Do Houston Dash Players Make