
01/03/21 | Cyber
The Quantum-Secure Net project (part 2/3): European product of Quantum Key Distribution
In the first article we introduced what are the main problems of modern cryptography, or rather, what are the mathematical limitations that are exposed by the world ...
156
Read

22/02/21 | Cyber
TryHackMe: cyber and gamification
Some time ago I told you about the Ares project, an online platform developed according to the concept of gamification, today we resume the discussion by presenting the ...
381
Read

15/02/21 | Cyber
Microsoft: security and privacy at the time of Covid
A few months ago we talked about the importance of security and privacy at the time of COVID (see article), highlighting some ethical and social aspects of ...
199
Read

01/02/21 | Cyber
CyberChallenge.it, the 2021 edition at the starting blocks
CyberChallenge.it is one of the many answers that Italy is giving (together with new degree courses, professional training programs, and higher education in ...
482
Read

25/01/21 | Cyber
The Quantum-Secure Net Project (part 1/3): The quantum threat to modern cryptography
This article is divided into three parts, and aims to retrace the main elements of cryptography and the changes that the "quantum" world has introduced until ...
640
Read

18/01/21 | Cyber
The AIDA project: Artificial Intelligence at the service of law enforcement
The postulate of the eternal struggle between cops and thieves is also confirmed in its digital transposition. The strategic and technological improvement of one of the two parties ...
552
Read

11/01/21 | Cyber
Money muling: a way to launder money
In this article I will talk about "money muling": an illegal practice that favors drug trafficking, human trafficking, online fraud and which risks putting ...
1142
Read

04/01/21 | Cyber
2020: a year of hacking
Cyberspace is the most complex thing man has ever built: on the one hand, it represents the union of thousands of networks that make it difficult even to have a photograph ...
1108
Read

28/12/20 | Cyber
IMD WORLD DIGITAL COMPETITIVENESS RANKING 2020: Italy in 42nd place
Still an achievement to forget! This time it is a Swiss organization that says it, it is the International ...
819
Read

21/12/20 | Cyber
Sunburst: a Pearl Harbor Cyber?
In a few years, when the current terrible pandemic is finally under control, 2020 will not be remembered ...
1690
Read

14/12/20 | Cyber
FireEye hacked, by whom?
The US company FireEye, cyber security giant, recently reported being a victim ...
793
Read

14/12/20 | Cyber
Little Red Riding Hood and Climbing Beyond the Cloud (How to Become a Hacker)
"Once upon a time there was the real world ..." In a hundred years with this premise we will tell a fairy tale to make the ...
854
Read

07/12/20 | Cyber
Quantum Supremacy to China?
For some time we have been talking about the evolution of quantum technology applied to computers and ...
1665
Read

30/11/20 | Cyber
Cloud and Confidential Computing ...
For years, cybersecurity experts from private companies and public organizations have faced the ...
603
Read

23/11/20 | Cyber
Microsoft Pluton, for a safer world
A few days ago Microsoft presented its latest novelty to the world: Microsoft Pluton. Announced in ...
1409
Read

16/11/20 | Cyber
Cyber: has Russia attacked Norway?
Cyberspace is increasingly a territory of conflict, it is now possible to realize this every day, it is no longer talked about ...
1140
Read

09/11/20 | Cyber
Project Ares: cyber and gamification
Research in the cyber field is increasingly pushed and touches all aspects of the fifth domain. Training is one of ...
577
Read

02/11/20 | Cyber
American elections: Trump's website hacked
We are in time of American elections, in a few days it will be known who will lead the first world power and, of ...
495
Read

26/10/20 | Cyber
The TIDoS Framework
For Kaly Linux lovers, Metasploit is the framework used to perform Penetration Testing activities ... In the ...
255
Read

19/10/20 | Cyber
Botnets: one of the biggest threats in cyberspace
Cybersecurity is a shared responsibility, which affects us all. We must start from this assumption of ...
1987
Read