19/06/17 | Cyber
ELT: First Workshop on "Electromagnetic Spectrum Operations" in collaboration with SMD Information and Security Department
The 15 June 2017, at the headquarters of Elettronica Spa in Rome, took place the first meeting on Electromagnetic Spectrum Operations (Operations with the electromagnetic spectrum) ...
2133
Read
05/06/17 | Cyber
Wannacryptor: chronicle of a disaster announced (and it will not be the last). Here's what happened ...
In cyber-space, reality is hardly what it seems and a cyberattack, although it has risen to the honor of the chronicles for the planetary scope and the great damages caused ...
1229
Read
24/05/17 | Cyber
"Blue Whale Challenge", a deadly game on social networks. The postal police sound the alarm
The postal police intervene with a page on Facebook "a life as a social" to stem the dangers of a dangerous game, Blue Whale Challenge that until now ...
1922
Read
22/05/17 | Cyber
Operation Vault 7: the point on the "secrets" of the CIA unveiled until today, while in the world rages WannaCry
In the almost total indifference of the general media, the Vault 7 operation, launched by WikiLeaks last March 7, continues to reveal interesting material about ...
3104
Read
09/05/17 | Cyber
Privacy in the Cyber-Era
Technological innovation continually proposes new tools for an increasingly connected planet1, but at the same time exposes personal data to new threats and, more generally ...
795
Read
02/05/17 | Cyber
Locked Shields 2017: the most important Cyber exercise in the world
In the days between 24 and 28 April, the Locked Shields exercise, the largest and most advanced ...
854
Read
19/04/17 | Cyber
Cyber Defense: AlienVault OSSIM, the most widely used SIEM open source in the world
At least that's how AlienVault, a private American software development company based in San Mateo, California, Silicon Valley and offices in many countries of the world ...
5176
Read
09/04/17 | Cyber
Does Cyber become a science?
A little by chance, a little because my curiosity always leads me to search for new experiences, a few days ago it is known that at Sapienza, at the Computer Science Department ...
555
Read
24/03/17 | Cyber
The harsh law of counterintelligence: Weeping Angelo, Pterodactyl and the other CIA "cyber creatures" revealed
The news quickly made the rounds of the world at the beginning of the month: WikiLeaks, the organization that belongs to the ...
4177
Read
20/03/17 | Cyber
New frontier: data encryption and DNA
Sandia National Laboratories scientists are looking for partners for the application of technologies for the ...
775
Read
26/02/17 | Cyber
Has Italy awakened in cyber-space?
"Keep quiet the enemy listens to you", he warned of a manifesto conceived at the time of the last world war. The need was ...
2780
Read
01/02/17 | Cyber
Information management and cyber risks of the Forza NEC system: some reflections
The "Forza NEC" program is now a consolidated presence among the projects aimed at bringing together digitization and ...
1188
Read
03/01/17 | Cyber
End of year from "shivering" in cyber space, between new risks and old "mutant" threats
The cyber space also in this beginning 2017 is, as always, in turmoil. Unfortunately it is not only for innovations ...
2076
Read
30/12/16 | Cyber
Soldiers on a New Year's eve mission can wish to be happy with PrP Channel
A month ago the website and dedicated YouTube channel was born, there are many videos that reach the editorial staff of PrP ...
519
Read
24/11/16 | Cyber
"MIRAI": from the Japanese comics the name of the last "cyber-nightmare"
I read the plot of the Japanese manga "MIRAI NIKKI" ("future diary"), however, except to realize that it is not about ...
1902
Read
24/10/16 | Cyber
The US is still under attack! The cyber-influence campaign on the American elections is another success
As noted by many observers, we are witnessing an escalation in the world of cyberwarfare that is unveiling ...
1490
Read
11/10/16 | Cyber
Cyberwarfare, Russia-USA
The 14 June 2016, during the NATO summit in Warsaw, cyberspace was recognized as the "fifth dimension" ...
1359
Read
05/10/16 | Cyber
Cyber Security, we finally have an "Infosec" web application
According to recent studies, a constant number of companies have claimed to have suffered a cyber attack (37,6%) with ...
932
Read
30/09/16 | Cyber
Cybertech 2016, 50 nations are confronted in Rome
The third conference and world exhibition scheduled for Cybertech was held yesterday at the Palazzo dei Congressi in Rome ...
331
Read
26/08/16 | Cyber
Where do hackers dare: with the attack on the US political system has an impassable limit been exceeded?
Nowadays there is a lot of talk about everything that has the prefix "cyber" (cyberdefence, cybersecurity, cyber ...
1356
Read