Monthly Archives: April 2014

FBI Plans to Have 52 Million Photos in its NGI Face Recognition Database by Next Year

New documents released by the FBI show that the Bureau is well on its way toward its goal of a fully operational face recognition database by this summer. EFF received these records in response to our Freedom of Information Act lawsuit for information…

FBI Abruptly Walks Out On Senate Briefing After Being Asked How ‘Insider Threat’ Program Avoids Whistleblowers

While we’ve been disappointed that Senator Chuck Grassley appears to have a bit of a double standard with his staunch support for whistleblowers when it comes to Ed Snowden, it is true that he has fought for real whistleblower protections for quite…

Gartner Recognizes VASCO Data Security in Leaders Quadrant in Magic Quadrant for User Authentication

VASCO positioned as a leader for its ability to execute and completeness of vision OAKBROOK TERRACE, Illinois and ZURICH, Jan. 28, 2014 /PRNewswire/ — VASCO Data Security International, Inc. (www.vasco.com) (Nasdaq: VDSI), a leading software security…

L’ipocrisia della forma ed il senso della giustizia

Lo so non dovrei ne stupirmi ne arrabbiarmi, ma non ci posso fare nulla tutte le volte che ho a che fare con la burocrazia italica non osso fare a meno di avere un travaso di bile. Non si tratta della cronica inefficienza, o della assoluta mancanza di professionalità di una classe manageriale pubblica inetta, ma proprio dello spirito con cui le cose vengono, nella pubblica amministrazione, gestite. Esiste una profonda ipocrisia nella gestione della res publica e nei servizi al cittadino che basa la sua essenza sulla forma del regolamento e non nel suo spirito, quella stessa ipocrisia che…

Wireshark, Tools and forensic

  Intro   Making a forensic analysis means to be able to collect and analyze data in order to find out evidence that could led you to a specific break.   Although is usually considered a post-mortem activity in the IT realm this aspect is less marked than in other forensic environment. If we are running an investigation on a homicide, as an example, we will be present when everything is already done, and we just have to collect cold evidence. On the other end when we are running a forensic IT investigation we cannot be sure that the event…

Posts navigation