The Chief Information Security Officer, what skills?
For many cybersecurity professionals, the ultimate career goal is to assume the role of Chief Information Security Officer (CISO). That of CISO is ...
Read
INTEL launches the new generation of Tiger Lake processors
On September XNUMX, Intel announced the release of the new generation of processors, the eleventh, called "Tiger Lake". The house of Santa Clara announces ...
Read
How to compete in Cyberspace: the new approach
On August 25, 2020, a very interesting article was published in Foreign Affairs, by Nakasone and Sulmeyer. The first, Paul Miki Nakasone, commander of the US Cyber ​​...
Read
Trickbot: the most widespread trojan in COVID 19 campaigns
Trickbot malware belongs to the spyware Trojan family, mainly used against banking industry targets. Its first appearance dates back to 2016 and its ...
Read
The new frontiers of Cyber ​​Security
Could companies, public institutions and even individual citizens pay dearly for the information technology revolution that awaits us? How to counter the dangers that ...
Read
Artificial Intelligence for the conversion between programming languages
We are no longer surprised when we hear about Artificial Intelligence, as Alan Turing had predicted 70 years ago, in his essay "Computing Machinery and ...
Read
The future of public key cryptography in the era of quantum computing
In recent years, the academic, industrial and government world has invested energy and resources in the field of quantum computing, in computers that exploit phenomena ...
Read
Hacked European supercomputers: who's behind it?
Last May some articles appeared that read that several European supercomputers (at least twelve) were hacked, access disabled, and it had to ...
Read
Mystery on the causes of the accident at the Natanz nuclear site (Iran). Is this really a cyber attack?
On Friday, July 3, the authorities of the Islamic Republic of Iran admitted that at the Natanz site, ...
Read
Australia denounces cyber attack: China on the dock?
On 19 June, the Australian government publicly denounced that it had been the subject of attacks for some time ...
Read
Interview with the criminologist Bartolo Danzi: "The network cancels our conscience"
Cybercrime, cyberstalking, cyber-pedophilia are widespread problems that find fertile ground in ...
Read
Cyber ​​Security in Saudi Arabia: review of the main government companies
In the globally widespread scenario of Cyber ​​Crime characterized by criminal activities that exploit components of the ...
Read
The security of remote access infrastructure and services at the time of Covid-19
On March 29, La Repubblica published an article whose incipit was this: “The current health and social crisis ...
Read
Data leak regarding the Minuteman III nuclear ballistic system?
Ransomware, as we know, has been hitting undisturbed for years and it seems that things are not meant to ...
Read
The town of Weiz, Austria, suffers a ransomware attack
Weiz, an Austrian town of 11.000 inhabitants, was hacked. Public online services suffered data theft ...
Read
FuckUnicorn: ransomware disguised as an Immuni app
The global health emergency has created numerous opportunities to spread cyber offensives. The health infrastructure, ...
Read
The "Ile de France" region raises on Artificial Intelligence
France is launched in pursuit of the big names on the path of artificial intelligence. In fact, it is not new ...
Read
easyJet: data of 9 million users stolen
The global health emergency has had a huge impact on airlines, forced to suspend many flights ...
Read
Geopolitics, Cyberthreat, Cyber ​​Risk: Impacts, Evaluation, Dynamics and Awareness
The technological impact on social and economic life is not the subject of choices, but it is inevitable, for better or for worse, ...
Read
Steganalysis and Machine Learning: a European answer
Steganography is a secret mechanism for encoding information by any means of transmission ....
Read

Pages