22/05/17 | Cyber
Operation Vault 7: the point on the "secrets" of the CIA unveiled until today, while in the world rages WannaCry
In the almost total indifference of the general media, the Vault 7 operation, launched by WikiLeaks last March 7, continues to reveal interesting material about ...
3103
Read
09/05/17 | Cyber
Privacy in the Cyber-Era
Technological innovation continually proposes new tools for an increasingly connected planet1, but at the same time exposes personal data to new threats and, more generally ...
795
Read
02/05/17 | Cyber
Locked Shields 2017: the most important Cyber exercise in the world
In the days between 24 and 28 April, the Locked Shields exercise, the largest and most advanced ...
854
Read
19/04/17 | Cyber
Cyber Defense: AlienVault OSSIM, the most widely used SIEM open source in the world
At least that's how AlienVault, a private American software development company based in San Mateo, California, Silicon Valley and offices in many countries of the world ...
5162
Read
09/04/17 | Cyber
Does Cyber become a science?
A little by chance, a little because my curiosity always leads me to search for new experiences, a few days ago it is known that at Sapienza, at the Computer Science Department ...
555
Read
24/03/17 | Cyber
The harsh law of counterintelligence: Weeping Angelo, Pterodactyl and the other CIA "cyber creatures" revealed
The news quickly went around the world at the beginning of the month: WikiLeaks, the organization headed by Mr. Assange, came into possession of more than eight thousand files ...
4176
Read
20/03/17 | Cyber
New frontier: data encryption and DNA
Sandia National Laboratories scientists are looking for partners to apply text encryption technologies using synthetic DNA technology ...
773
Read
26/02/17 | Cyber
Has Italy awakened in cyber-space?
"Silence the enemy listens to you", warned a manifesto created at the time of the last world war. The need was to raise awareness among the soldiers and the population regarding the ...
2780
Read
01/02/17 | Cyber
Information management and cyber risks of the Forza NEC system: some reflections
The "Forza NEC" program is now a consolidated presence among the projects aimed at bringing together digitization and ...
1188
Read
03/01/17 | Cyber
End of year from "shivering" in cyber space, between new risks and old "mutant" threats
The cyber space also in this beginning 2017 is, as always, in turmoil. Unfortunately it is not only for innovations ...
2075
Read
30/12/16 | Cyber
Soldiers on a New Year's eve mission can wish to be happy with PrP Channel
A month ago the website and dedicated YouTube channel was born, there are many videos that reach the editorial staff of PrP ...
519
Read
24/11/16 | Cyber
"MIRAI": from the Japanese comics the name of the last "cyber-nightmare"
I read the plot of the Japanese manga "MIRAI NIKKI" ("future diary"), however, except to realize that it is not about ...
1902
Read
24/10/16 | Cyber
The US is still under attack! The cyber-influence campaign on the American elections is another success
As noted by many observers, we are witnessing an escalation in the world of cyberwarfare that is unveiling ...
1490
Read
11/10/16 | Cyber
Cyberwarfare, Russia-USA
The 14 June 2016, during the NATO summit in Warsaw, cyberspace was recognized as the "fifth dimension" ...
1359
Read
05/10/16 | Cyber
Cyber Security, we finally have an "Infosec" web application
According to recent studies, a constant number of companies have claimed to have suffered a cyber attack (37,6%) with ...
932
Read
30/09/16 | Cyber
Cybertech 2016, 50 nations are confronted in Rome
The third conference and world exhibition scheduled for Cybertech was held yesterday at the Palazzo dei Congressi in Rome ...
331
Read
26/08/16 | Cyber
Where do hackers dare: with the attack on the US political system has an impassable limit been exceeded?
Nowadays there is a lot of talk about everything that has the prefix "cyber" (cyberdefence, cybersecurity, cyber ...
1355
Read
03/08/16 | Cyber
Cyberattacks and defense of critical infrastructures: the risk track
According to the railway development plan prepared by Network Rail, the major manager and developer of ...
1028
Read
31/05/16 | Cyber
Quis custodiet ipsos custodes: the new PNR Directive and the risks of mass surveillance
During the first quarter of the 2016, traffic data at Italian airports provided by Assaeroporti are ...
1154
Read
27/05/16 | Cyber
New cyber threats among the US Report on US military activity in China
The Chinese government and the PLA (People Liberation's Army) are strongly involved in a series of targeted investments and ...
1435
Read