ELT: First Workshop on "Electromagnetic Spectrum Operations" in collaboration with SMD Information and Security Department
The 15 June 2017, at the headquarters of Elettronica Spa in Rome, took place the first meeting on Electromagnetic Spectrum Operations (Operations with the electromagnetic spectrum) ...
Read
Wannacryptor: chronicle of a disaster announced (and it will not be the last). Here's what happened ...
In cyber-space, reality is hardly what it seems and a cyberattack, although it has risen to the honor of the chronicles for the planetary scope and the great damages caused ...
Read
"Blue Whale Challenge", a deadly game on social networks. The postal police sound the alarm
The postal police intervene with a page on Facebook "a life as a social" to stem the dangers of a dangerous game, Blue Whale Challenge that until now ...
Read
Operation Vault 7: the point on the "secrets" of the CIA unveiled until today, while in the world rages WannaCry
In the almost total indifference of the general media, the Vault 7 operation, launched by WikiLeaks last March 7, continues to reveal interesting material about ...
Read
Privacy in the Cyber-Era
Technological innovation continually proposes new tools for an increasingly connected planet1, but at the same time exposes personal data to new threats and, more generally ...
Read
Locked Shields 2017: the most important Cyber ​​exercise in the world
In the days between 24 and 28 April, the Locked Shields exercise, the largest and most advanced ...
Read
Cyber ​​Defense: AlienVault OSSIM, the most widely used SIEM open source in the world
At least that's how AlienVault, a private American software development company based in San Mateo, California, Silicon Valley and offices in many countries of the world ...
Read
Does Cyber ​​become a science?
A little by chance, a little because my curiosity always leads me to search for new experiences, a few days ago it is known that at Sapienza, at the Computer Science Department ...
Read

  
The harsh law of counterintelligence: Weeping Angelo, Pterodactyl and the other CIA "cyber creatures" revealed
The news quickly made the rounds of the world at the beginning of the month: WikiLeaks, the organization that belongs to the ...
Read
New frontier: data encryption and DNA
Sandia National Laboratories scientists are looking for partners for the application of technologies for the ...
Read
Has Italy awakened in cyber-space?
"Keep quiet the enemy listens to you", he warned of a manifesto conceived at the time of the last world war. The need was ...
Read
Information management and cyber risks of the Forza NEC system: some reflections
The "Forza NEC" program is now a consolidated presence among the projects aimed at bringing together digitization and ...
Read
End of year from "shivering" in cyber space, between new risks and old "mutant" threats
The cyber space also in this beginning 2017 is, as always, in turmoil. Unfortunately it is not only for innovations ...
Read
Soldiers on a New Year's eve mission can wish to be happy with PrP Channel
A month ago the website and dedicated YouTube channel was born, there are many videos that reach the editorial staff of PrP ...
Read
"MIRAI": from the Japanese comics the name of the last "cyber-nightmare"
I read the plot of the Japanese manga "MIRAI NIKKI" ("future diary"), however, except to realize that it is not about ...
Read
The US is still under attack! The cyber-influence campaign on the American elections is another success
As noted by many observers, we are witnessing an escalation in the world of cyberwarfare that is unveiling ...
Read
Cyberwarfare, Russia-USA
The 14 June 2016, during the NATO summit in Warsaw, cyberspace was recognized as the "fifth dimension" ...
Read
Cyber ​​Security, we finally have an "Infosec" web application
According to recent studies, a constant number of companies have claimed to have suffered a cyber attack (37,6%) with ...
Read
Cybertech 2016, 50 nations are confronted in Rome
The third conference and world exhibition scheduled for Cybertech was held yesterday at the Palazzo dei Congressi in Rome ...
Read
Where do hackers dare: with the attack on the US political system has an impassable limit been exceeded?
Nowadays there is a lot of talk about everything that has the prefix "cyber" (cyberdefence, cybersecurity, cyber ...
Read

Pages