Hydro, the Norwegian aluminum giant under cyber attack
A few days ago (19 in March) the news was that one of the largest aluminum production companies, the Norwegian Hydro, suffered a cyber attack. The attack conducted ...
Read
The NSA presents Ghidra, a powerful tool for reverse engineering
If one day we had to find ourselves analyzing an alien technological artifact, to understand its operating principle, replicate the technology and acquire the new one ...
Read
US Cyber ​​Command attacks the Russian Internet Research Agency
Sometimes it happens that important events happen but that in Italy nobody gives you weight. This happened once again at the end of 2018. According to the New York Times, however, not ...
Read
Sometimes they come back!
After a two-year absence, the destructive Shamoon malware (W32. Disttrack. B) resurfaced on December 10 in a new wave of attacks on targets in the Middle East. These ...
Read
Airbus under attack! Industrial espionage by means of Supply Chain Attack?
Let's start from the facts. 30 January 2019: Airbus releases a press release announcing that it has suffered a cyber attack, in particular the incident concerns the part ...
Read
Cyberchallenge.IT: challenges for national cybersecurity
The selective phase of the children who will participate in the Cyberchallenge.IT initiative organized by the CINi National Cybersecurity Laboratory ended last week ...
Read
ENISA: analysis of the research and development priorities of the Cyber ​​sector
The European Union Agency for Network and Information Security (ENISA) is the European center of cyber experts. The main office is in Greece, in Athens, while a ...
Read
The European Union believes in it: 9 billion euros for digital
The eleventh edition of the FIC (Forum international de la Cybersécurité), an event of international importance, took place in Lille on 22 and 23 January 2019. To understand the ...
Read

  
Brain waves as a password? It looks like yes ...
The weakness of password-based systems has led to the development of studies focused on biometrics. Among these one ...
Read
CIMON, the first "Intelligent" space assistant robot
Artificial Intelligence and Space: two scientific disciplines at the limit of our knowledge, allied to help ...
Read
Elfin, the "armed" cyber arm of the revolution capable of eliminating computer memories. Forever.
Elfin, "Elfo" in Italian, is the code name that the computer security company Symantec has attributed to a ...
Read
Netherlands: Defense Cyber ​​Strategy 2018
In the introduction of the new Cyber ​​Strategy Strategy for the Defense of the Netherlands, we read: "The Cyber ​​Security ...
Read
Global Cybersecurity Index 2017: Italy at 31 ° place ... downhill?
The International Telecommunication Union, a UN agency specialized in ICT, takes the trouble to measure the ...
Read
Cyber-weapons: for US Defense are weapons of mass destruction?
The American DoD, according to the well-informed Mark Pomerlau, wants to explore the relationships between cyber and weapons of ...
Read
Saipem under cyber attack
Let's start with the facts: Monday 10 December 2018, the Saipem (Italian Association of Perforations and Assemblies), a company ...
Read
Cyber: Undersecretary Tofalo, strengthen Armed Forces capacity to protect the country system in the cybernetic domain
"My mission is to strengthen the capabilities of our Armed Forces in ensuring the protection of the System ...
Read
Launched CLIP OS, the French Open Operating System
The 5 and 6 December, in Paris, took place the fourth edition of the "Paris Open Source Summit", continues incessantly in ...
Read
Marriott international: stolen data from 500 millions of customers
The Marriott international, an American multinational, this morning admitted to being hit by an attack ...
Read
Italy under attack
Italy has long been in the sights of hackers, but until yesterday it seemed that nobody was interested ....
Read
IBM and NVIDIA Tesla supply the Sierra Super computer to the Lawrence Livermore National Laboratory
The American defense world is rich in research institutes, among these, of primary importance, we can mention the ...
Read

Pages