Microsoft Pluton, for a safer world
A few days ago Microsoft presented its latest novelty to the world: Microsoft Pluton. Announced in collaboration with leading Silicon processor manufacturers ...
Read
Cyber: has Russia attacked Norway?
Cyberspace is increasingly a territory of conflict, it is now possible to realize it every day, it is no longer talked about only in professional forums but has become a topic for ...
Read
Project Ares: cyber and gamification
Research in the cyber field is increasingly pushed and touches all aspects of the fifth domain. Training is one of the most important. Being able to train staff in short ...
Read
American elections: Trump's website hacked
We are in time of American elections, in a few days it will be known who will lead the first world power and, consequently, the world. The race between Donald Trump, current ...
Read
The TIDoS Framework
For Kaly Linux lovers, Metasploit is the framework used to perform Penetration Testing ... Recently, something new has come forward: TIDoS ....
Read
Botnets: one of the biggest threats in cyberspace
Cybersecurity is a shared responsibility, which affects us all. We must start from this assumption of responsibility to fully understand a phenomenon that undermines ...
Read
Cyber ​​US-Russia truce ... what if it goes through operations against Trickbot?
According to the Washington Post, the US Cyber ​​Command in recent days has been engaged in a preventive operation targeting the Trickbot botnet. The operation ...
Read
Microsoft - the importance of security and privacy in the time of Covid
"Microsoft's goal is to democratize access to technology, so that everyone can benefit from it, keeping the protection of privacy and the ...
Read
The United States first in the world in the cyber field
This, in summary, is what is stated in the National Cyber ​​Power Index (NCPI) 2020 of the Belfer Center for Science and ...
Read
The Chief Information Security Officer, what skills?
For many cybersecurity professionals the ultimate career goal is to take on the role of ...
Read
INTEL launches the new generation of Tiger Lake processors
On September XNUMX, Intel announced the release on the market of the new generation of processors, the eleventh, ...
Read
How to compete in Cyberspace: the new approach
On 25 August 2020, on Foreign Affairs, a very interesting article was published, signed Nakasone and Sulmeyer ....
Read
Trickbot: the most widespread trojan in COVID 19 campaigns
Trickbot malware belongs to the family of spyware Trojans, mainly used against industry targets ...
Read
The new frontiers of Cyber ​​Security
Companies, public institutions and even individual citizens could pay dearly for the technological revolution ...
Read
Artificial Intelligence for the conversion between programming languages
We are no longer surprised when we hear about Artificial Intelligence, as Alan Turing had predicted by now ...
Read
The future of public key cryptography in the era of quantum computing
In recent years, the academic, industrial and government world has invested energy and resources in the field of ...
Read
European supercomputers hacked: who is behind it?
Last May some articles appeared that read that several European supercomputers (at least twelve) are ...
Read
Mystery on the causes of the accident at the nuclear site of Natanz (Iran). Is it really a cyber attack?
On Friday, July 3, the authorities of the Islamic Republic of Iran admitted that at the Natanz site, ...
Read
Australia denounces being under cyber attack: is China in the dock?
On 19 June, the Australian government publicly denounced that it had been the subject of attacks for some time ...
Read
Interview with criminologist Bartolo Danzi: "The network cancels our conscience"
Cybercrime, cyberstalking, cyberpedophilia are very widespread problems that find fertile ground in the ...
Read

Pages