The deadly cyber-claws of the Russian bear strike both military and civilian targets. Fancy Bear's unstoppable rise to cyberspace
The universe of hacker groups is extremely vast and varied. As mentioned in previous articles, while the "good" ones, the so-called white hat or ethical hackers, constitute ...
Read
Oracle and R1 Group present: Beyond Bitcoin
In recent months the rapid increase (and partial decline) of value of many crypto-currencies has sparked heated debates, often based on wrong and little known concepts ...
Read
Locked Shield 2018 to the starting blocks!
Also this year in Tallin (but in fact throughout Europe) will be held, as usual, the largest Cyber ​​exercise in the world: Locked Shield. Using information from ...
Read
Meltdown: considerations on the impact on classified systems
Meltdown, a term whose meaning is synonymous with "disastrous collapse", or "nuclear catastrophe" has come into common use due to the safety concerns highlighted ...
Read
WannaCry infects Boeing: does the law of retribution strike again?
Who doesn't know Boeing? The leading US company in the aerospace field seems to have been hit by the malware known as WannaCry, a virus of ...
Read
How the security measures in the GDPR will change our approach to risks involving personal data
As indicated in the previous article (read) the new European legislation on the protection of personal data is upon us, and with it the whole system is innovated ...
Read
The secret war of hackers: The Equation Group, the "armed" cyber arm of US intelligence
That the network of the Internet was designed and implemented in the military in the United States is certainly not a mystery. As it is known that also many of the technologies ...
Read
INTERconNETtiamoci but with your head!
Italy is a strange country, one in which the inconclusiveness of the institutions is flanked (and made up for!) By personal excellence. Today I want to tell you about a case in which the ...
Read

  
Interview with Carlo Mauceli: The theft of credentials, risk factors and guidelines for the safety of Italian companies
Today we have the opportunity to talk about credential theft with one of the leading cybersecurity experts in ...
Read
DefenseReady, the software for the US Defense organizations
It is known that the Defense of the United States of America has for years a good relationship with Microsoft, the multinational of ...
Read
From North Korea, The Lazarus Group. Cyber ​​warriors or cyber criminals?
Being able to orientate correctly in that huge "gray area" that is becoming cyber-space is a very ...
Read
China: National Cyberspace Security Strategy
In December of 2016, China published the national cyber strategy through the ...
Read
Cyber ​​defense? Cisco Umbrella and Investigate
The term "cyber" has now become part of the common vocabulary and associated with other terms such as "attack", "defense ...
Read
The future computed: artificial intelligence according to Microsoft
The theme of Artificial Intelligence (AI in English) has entered strongly in our homes projecting us to ...
Read
Chaos Computer Club vs Italy!
On 23 December 2016, the so-called FOIA, or the Freedom Of Information Act, came into force in Italy ...
Read
SATORI, "the awakening" of the botnets and the other 2018 challenges for cyber security
Understanding which will be the most important trends for the year just inaugurated in terms of cyber security is not certain ...
Read
Cryptocurrency hacked? And the bitcoins go down!
One of the businesses of the moment seems to be investing in cryptocurrency. The best known are Bitcoin, Ripple, ...
Read
Dismantled the "Andromeda" botnet
A few days ago the news, passed over in silence as usual, of the dismantling of the Andromeda botnet in ...
Read
The higher the digitization level the greater the cyber risk
What factors determine cyber risk? What happens to a society that is too digitized? These questions arise ...
Read
Can a cyber attack endanger life?
The answer is yes. It has been like this for some time, even if it is not mentioned. A cyber attack is as dangerous as an attack for ...
Read

Pages