10/01/22 | Cyber
Google Dorks, these strangers ...
Google Dork is an advanced search technique that can help uncover hidden data from the Google search engine. Some people call them "Google commands" or a ...
5212
Read
05/01/22 | Cyber
The value of eXpanded Detection and Response
In CyberSecurity, what does eXpanded Detection and Response (XDR) mean? What features does an XDR system have? How can it help someone who has been hit by an attack? CyberSecurity ...
496
Read
03/01/22 | Cyber
Alexa, Artificial Intelligence and Common Sense
One might wonder what "common sense" means, perhaps looking for a definition in the Treccani dictionary, from which one would have: "Natural, instinctive ability to judge ...
2164
Read
29/12/21 | Cyber
Deepfakes: the art of creating "fake authors" at the time of artificial intelligence
In recent years, the development and implementation of deep neural networks has accelerated the development of applications capable of recognizing in ...
957
Read
27/12/21 | Cyber
Vulnerability ALARM: CVE-2021-44228, "Apache Zero-Day Log4j" for friends!
Once again the world of computer technology is shocked by the discovery of a vulnerability spread across a huge amount of computer systems, according to some ...
2568
Read
20/12/21 | Cyber
CyberSecurity and Health
Cyber attacks on healthcare infrastructures are intensifying in number and quality and are increasingly successful, bringing to the fore the need for ...
745
Read
16/12/21 | Cyber
Fighting the bad guys in a structured way
The world of technology, more particularly that of cyber security, is now full of acronyms and acronyms that make a dialogue between practitioners in the sector seem almost a ...
572
Read
13/12/21 | Cyber
Ethical Biohacking and Supply Chain
Since I was a boy I have been intrigued by Bioengineering so much that it has become the specialization of my course of study in Electronic Engineering. Later, my ...
532
Read
09/12/21 | Cyber
With SICYNT 250 children are more cyber-safe
December 7, 2021, 6.40 AM, somewhere near a Milan that for the most part still sleeps, considering that it is the ...
650
Read
08/12/21 | Cyber
Smart Working and Cybersecurity
Smart Working, a very popular term in the last year and a half, is the new way of working that involves different ...
435
Read
07/12/21 | Cyber
NATO Strategic Concept: the renewal process begins
Is the security context defined in November 2010 in the NATO Strategic Concept document still valid? Which...
716
Read
06/12/21 | Cyber
Keraunos: the interception-proof satellite link
"One of the projects that will contribute to the superiority of our armed forces". This is what the minister said ...
896
Read
01/12/21 | Cyber
Cyber Deterrence: UK and India fight together. Italy?
Today's war, the one that is fought with no holds barred in cyberspace (or through it), has not been won since ...
615
Read
29/11/21 | Cyber
Near Field Communication: the cyber threat we carry in our pockets
As part of the prevention of attacks on industrial information assets carried out during a ...
1089
Read
22/11/21 | Cyber
The Smishing, this unknown
Black Friday is approaching, a commercial event of American origin but which due to globalization ...
1503
Read
18/11/21 | Cyber
Trojan Source Attack, what is it?
How about if it were possible to trick compilers into producing binaries other than logic ...
821
Read
15/11/21 | Cyber
Cybercriminals vs Pirates
We live in really interesting times: exactly ten years ago the US Department of Defense defined the domain ...
458
Read
08/11/21 | Cyber
Network systems automation techniques
The reference to the use of automation techniques and possibly AI (Artificial Intelligence) has become ...
369
Read
02/11/21 | Cyber
The Strange Case of Spongebob's GreenPass
A couple of days ago, while I was having breakfast, I received a message on my smartphone saying “Good morning ....
3432
Read
25/10/21 | Cyber
NATO Strategy for Artificial Intelligence
On 21 October 2021, the defense ministers of NATO countries approved and released, for the first time, the ...
774
Read