The Quantum-Secure Net project (part 2/3): European product of Quantum Key Distribution
In the first article we introduced what are the main problems of modern cryptography, or rather, what are the mathematical limitations that are exposed by the world ...
Read
TryHackMe: cyber and gamification
Some time ago I told you about the Ares project, an online platform developed according to the concept of gamification, today we resume the discussion by presenting the ...
Read
Microsoft: security and privacy at the time of Covid
A few months ago we talked about the importance of security and privacy at the time of COVID (see article), highlighting some ethical and social aspects of ...
Read
CyberChallenge.it, the 2021 edition at the starting blocks
CyberChallenge.it is one of the many answers that Italy is giving (together with new degree courses, professional training programs, and higher education in ...
Read
The Quantum-Secure Net Project (part 1/3): The quantum threat to modern cryptography
This article is divided into three parts, and aims to retrace the main elements of cryptography and the changes that the "quantum" world has introduced until ...
Read
The AIDA project: Artificial Intelligence at the service of law enforcement
The postulate of the eternal struggle between cops and thieves is also confirmed in its digital transposition. The strategic and technological improvement of one of the two parties ...
Read
Money muling: a way to launder money
In this article I will talk about "money muling": an illegal practice that favors drug trafficking, human trafficking, online fraud and which risks putting ...
Read
2020: a year of hacking
Cyberspace is the most complex thing man has ever built: on the one hand, it represents the union of thousands of networks that make it difficult even to have a photograph ...
Read
IMD WORLD DIGITAL COMPETITIVENESS RANKING 2020: Italy in 42nd place
Still an achievement to forget! This time it is a Swiss organization that says it, it is the International ...
Read
Sunburst: a Pearl Harbor Cyber?
In a few years, when the current terrible pandemic is finally under control, 2020 will not be remembered ...
Read
FireEye hacked, by whom?
The US company FireEye, cyber security giant, recently reported being a victim ...
Read
Little Red Riding Hood and Climbing Beyond the Cloud (How to Become a Hacker)
"Once upon a time there was the real world ..." In a hundred years with this premise we will tell a fairy tale to make the ...
Read
Quantum Supremacy to China?
For some time we have been talking about the evolution of quantum technology applied to computers and ...
Read
Cloud and Confidential Computing ...
For years, cybersecurity experts from private companies and public organizations have faced the ...
Read
Microsoft Pluton, for a safer world
A few days ago Microsoft presented its latest novelty to the world: Microsoft Pluton. Announced in ...
Read
Cyber: has Russia attacked Norway?
Cyberspace is increasingly a territory of conflict, it is now possible to realize this every day, it is no longer talked about ...
Read
Project Ares: cyber and gamification
Research in the cyber field is increasingly pushed and touches all aspects of the fifth domain. Training is one of ...
Read
American elections: Trump's website hacked
We are in time of American elections, in a few days it will be known who will lead the first world power and, of ...
Read
The TIDoS Framework
For Kaly Linux lovers, Metasploit is the framework used to perform Penetration Testing activities ... In the ...
Read
Botnets: one of the biggest threats in cyberspace
Cybersecurity is a shared responsibility, which affects us all. We must start from this assumption of ...
Read

Pages