HOW-TO: How to build your own "homemade" Firewall
A practical way to save and keep your data safe. In this period in which the finances of companies and public administrations are put to the test, it is easy ...
Read
Cybertech 2019: many words and many good intentions. But the war has already been going on for years ...
In an important period for innovation and digital growth in Italy and throughout Europe, Cybertech, as it has for four years now, reaffirms itself as the main...
Read
Stories and anecdotes of a computer pioneer
Not quia difficilia sunt non audemus, sed quia non audemus difficilia sunt. (It is not because things are difficult that we do not dare, it is because we do not dare that they are difficult.) Lucio ...
Read
Cortana, what happens when "le" is asked to try out a mission to the limit?
Cortana, artificial intelligence from Microsoft with a name borrowed from a character from the Halo videogame, what happens when "her" is asked to try her hand at a ...
Read
Biometric Authentication: where we are and what impacts
It's been 23 years since Peter Steiner published the infamous cartoon "On the Internet, Nobody Knows You're a Dog" in The New Yorker, illustrating and, to some extent, ...
Read
F-35: analysis on cyber risks of fifth-generation fighters
The following article is for purely informative, illustrative and study purposes. The "tests" performed in the article are not real tests on the infrastructures or networks of others, but ...
Read
Create an innovative cyber startup: the main opportunities in Italy
We can say with certainty that MSME (micro and small-medium enterprises) represent the "backbone" of the Italian economy. In fact, considering the only "micro" (ie ...
Read
Protection from cyber-risks: at what point are they and what should cyber insurance cover
Interestingly, in a recent article in The Insurance Insider, a world-class insurance broker (AON) stated that according to data he collected for ...
Read

  
Quantum Computing and Cryptography
The Human Being, by its nature, needs to evolve and communicate. Communication is one of the aspects ...
Read
Sea Turtle: attack on the entire structure of the Internet
Among the numerous cyber attacks that are discovered, reported (but never publicly admitted), often ...
Read
Italian CyberChallenge: the experience of the team from the University of Cagliari
In the past we have given space to the activity called CyberChallenge.IT, with an article explaining the object ...
Read
Data, Information Security and Cyber ​​space: protect billions of data or dollars?
Most scholars and policy makers say that cyberspace favors lawlessness while ...
Read
The Russian Sytech, FSB contractor, hacked !!! Projects and data made public
News begins to arrive, albeit with a delay. The one hit doesn't seem like a big one, it's not a big one ...
Read
Regin, the RAT used against the "Russian Google" Yandex
In the world of computer security, the potential risks to companies and institutions, in the form of malware and toolkits ...
Read
Cybertech 2019 Tel Aviv: Israeli Excellence, a Military Model in favor of the Community and Innovation
That of the Tel Aviv CyberTech 2019 was a worldwide event, with hundreds of companies, guests and ...
Read
Metasploit, when the best defense is attack
In recent years we hear more and more often about "cyber attacks", "cyber warfare" and more generally about ...
Read
BlackBerry
BlackBerry Limited is a Canadian company headquartered in Waterloo, Ontario, active in 30 countries. Founded in 1984 with ...
Read
The NATO Cooperative Cyber ​​Defense Center of Excellence celebrates the entry of four new members
Bulgaria, Denmark, Norway and Romania join NATO CCDCOE thus bringing the number of participating countries to ...
Read
Are CISCO routers at risk?
A few days ago, on Wired, an article with a disturbing title was published: "A Cisco router bug has massive ...
Read
McAfee
McAfee LLC is a computer security company founded in 1987 under the name of McAfee Associates ...
Read

Pages