How much does it take to hack a mobile network?
Is electronic government secure
in the era of WikiLeaks and Anonymous?

Is SCADA hacking a Hollywood fiction
or the nowadays reality?
Internet banking: is there any chance to win
over the fraudsters?

Cyber-crimes, cyber-espionage, cyber-war: where do we draw a borderline?


Monday, April 16, 2012

The Call for Papers Is Finished!

The applications for report presentation at PHDays 2012 have been successfully collected. In a week, we will post a draft program of presentations.

The best IS experts will join us to present very serious topics. At present, we are processing the last applications. The waiting is almost over!

No comments:

Post a Comment