22/10/17 | Cyber
In Prague, from 23 October, the Open Source Summit Europe
Open Source Summit Europe is perhaps the most anticipated event in the European landscape in relation to the famous "penguin" of the Linux Operating System. A week of events, meetings, ...
319
Read
16/10/17 | Cyber
Injection, Broken Authentication and XSS are the main cyber risks
OWASP is a standard for secure web application production and if we consider that almost all applications are now web-based ... OWASP is also a global organization that ...
1650
Read
06/10/17 | Cyber
Cyber security: what is a SOC?
The world of cyber security is every day more complex and to manage the many computer accidents, more and more organizations begin to consider the hypothesis of ...
13707
Read
04/10/17 | Cyber
Cybertech Europe 2017: an opportunity for Italy
Network, Cybercrime, Cybersecurity vulnerabilities, these are just some of the themes that we hear more and more often from the news, online news and other platforms ...
500
Read
23/09/17 | Cyber
"Barometers mad" in cyber-space. Here's how NotPetya and the other cyber-hurricanes have fired the 2017 summer
The one just ended will certainly be remembered as one of the hottest and dryest seasons since meteorological data are detected. Probably, the 2017 summer will be ...
1926
Read
16/09/17 | Cyber
Cyber attack at the base of USS John S. McCain collision?
The news of the ongoing 21 collision in the Pacific waters east of the ... has appeared in various newspapers since the first days after the accident.
3099
Read
14/09/17 | Cyber
Defending against quantum computers: the US approach to the problem
The future has not yet arrived, but we must prepare to defend ourselves against new threats! It might seem like a movie sentence, maybe it is, but it also represents the approach of ...
1287
Read
12/09/17 | Cyber
The cyber impact on the world is now measured in billions of dollars
A few months ago, someone might have noticed the news concerning one of the largest companies in the world in the field of container transport, logistics and ...
790
Read
04/09/17 | Cyber
Cyber defense? Safe programming is the basis of everything
When it comes to cyber defense, always think of the bad computer pirates and those who, on the other side of the ...
1433
Read
31/08/17 | Cyber
Future military decision-making processes will be supported by cloud supercomputers?
For the US Department of Defense, the answer appears to be positive. At least so it just appeared on the website of the ...
655
Read
21/08/17 | Cyber
President Trump elevates the United States Cyber Command to the rank of Unified Combatant Command
That the cyberspace and the operations accomplished through this fifth dimension had grown in importance was ...
1440
Read
07/08/17 | Cyber
A security helmet: view the Cyberspace
Cyberspace, understood as a new dimension in which man can interact (and when war happens), to those who seek ...
884
Read
31/07/17 | Cyber
At Cyber Space Frontiers: What happens if a video can be encoded in the DNA of a bacterium?
The world is increasingly complex and often scientific discoveries can have unpredictable facets ....
1261
Read
25/07/17 | Cyber
The CIA also recruits Star Wars rebels, while cyber attacks prove to trigger a real international crisis
The Vault 7 operation by Wikileaks is about to go to the first six months since its inception, the 7 last March. At the rhythm of ...
1724
Read
14/07/17 | Cyber
What is FIWARE?
This is a European initiative created by the Public Private Partnership Future Internet, aimed at increasing the ...
3220
Read
24/06/17 | Cyber
Cyber News: DPCM 17 February 2017 released
The new "directive containing indications for cyber protection and computer security ... has recently come out ...
1877
Read
19/06/17 | Cyber
ELT: First Workshop on "Electromagnetic Spectrum Operations" in collaboration with SMD Information and Security Department
The 15 June 2017, at the head office of Elettronica Spa in Rome, the first meeting on the Electromagnetic Spectrum took place ...
2132
Read
05/06/17 | Cyber
Wannacryptor: chronicle of a disaster announced (and it will not be the last). Here's what happened ...
In cyber space, reality is hardly what it seems and a cyber attack, although it has risen to the honor of ...
1229
Read
24/05/17 | Cyber
"Blue Whale Challenge", a deadly game on social networks. The postal police sound the alarm
The police post intervenes with a page on Facebook "a social life" to stem the dangers from a ...
1921
Read
22/05/17 | Cyber
Operation Vault 7: the point on the "secrets" of the CIA unveiled until today, while in the world rages WannaCry
In the almost total indifference of the general media, the Vault 7 operation, launched by WikiLeaks last March 7, ...
3101
Read