Why is there no universal antivirus?
Since computer viruses exist, there have also been antivirus programs. This is an obvious reality. But why aren't antivirus products effective against all viruses? ...
Read
What you need to know about cyberspace to live well: "the cyber accident"
It often happens that friends or simple acquaintances ask me questions about the cyber world. Often these are questions aimed at clarifying some particular aspect ...
Read
The untold story of the cyber attack on the 2018 Olympics
On January 1863, XNUMX, Pierre De Coubertin was born, the man to whom we must say thank you for having reintroduced the Olympics. Its noble aims and values ​​are the essence of ...
Read
The Privacy Guarantor fines Eni Gas e Luce (Egl) for 11,5 million euros
The press release of a few days ago with which the Guarantor for the protection of personal data announced that he had sanctioned Eni Gas and Luce ...
Read
West Point Army Cyber ​​Institute
Who hasn't heard, at least once, of the famous American military institute in West Point? If only for watching any war movie in the cinema or on tv ....
Read
Ransomware: a bit of history. The dark side of cryptology
For some time now we have been hearing about ransomware: one of the most well-known attacks, perhaps because it consists in putting your hands directly in the wallet of those who fall victim to it ...
Read
USA - Iran, a new hybrid war with an uncertain future
“There is a silent war. The weapons are invisible, the deployments fluid and difficult to identify. It might seem like a novel spy story and yet events like ...
Read
USA vs Iran: conventional or cyber conflict?
What is happening in the world these days you can read it in all the newspapers. Without claiming, of course, to be able to read "the truth" about what happens (but then there is a "...
Read
2019 Data Breach Calendar
End of the year. Moments of reflection and even detachment, albeit brief, from everyday life. Skiing among the beautiful ...
Read
Phishing and Fake News, from your e-mail to governments: when the vulnerability is between keyboard and computer ...
You will have received at least once e-mails in which some figure, an official of an unspecified ...
Read
European cyber security challenge: Italy second in the standings
Interview with Emilio Coppa, Giovanni Lagorio and Mario Polino coaches of the Italian cyber defender team "TEAM ...
Read
APT 32 hack BMW and Hyundai?
A few days ago the news was that hackers would hit BMW and Hyundai. The hackers would ...
Read
Lockheed Martin: some updates on cyber risk analysis
(Sometimes they come back ...) A few months ago we stopped to analyze the cyber risks related to the F-35, this has ...
Read
The "shadow warriors" brigade
It is a few days ago the news about the establishment of the 127th Cyber ​​Battalion of the National Army National Guard ...
Read
The development of the cyber capacity of the Army
The Army Study Center, Center of Thought of reference of the terrestrial military component 1, launches the first ...
Read
2019 SECURITY: AI and APT with ONLINE DEFENSE
Today at the Milan-Rho SAFETY fair, we'll see you at the "Cyber ​​Arena" in the 5 Pavilion, the exhibition area, ...
Read
Hacking the hackers! When to fall into the (cyber) canvas is the spider itself ...
In previous articles the cyber space has often been represented as the far west in which the classics are set ...
Read
29 OCTOBER 1969: Arpanet is born, today's Internet
In 1958, US President DD Eisenhower creates the Advanced Research Project Agency, the agency of the ...
Read
Italy: new technologies, training and governance of non-existent risk
Today the computer is in many cases "invisible" at least in the sense of a tool necessarily consisting of a ...
Read
Cyber ​​attack against Iran? The United States says ...
On October 16, Reuters leaves with an article-sensation "Exclusive: US carried out secret cyber strike on Iran in ...
Read

Pages