The AIDA project: Artificial Intelligence at the service of law enforcement
The postulate of the eternal struggle between cops and thieves is also confirmed in its digital transposition. The strategic and technological improvement of one of the two parties ...
Read
Money muling: a way to launder money
In this article I will talk about "money muling": an illegal practice that favors drug trafficking, human trafficking, online fraud and which risks putting ...
Read
2020: a year of hacking
Cyberspace is the most complex thing man has ever built: on the one hand, it represents the union of thousands of networks that make it difficult even to have a photograph ...
Read
IMD WORLD DIGITAL COMPETITIVENESS RANKING 2020: Italy in 42nd place
Still an achievement to forget! This time it is a Swiss organization saying it, the International Institute for Management Development, IMD for short. IMD, born ...
Read
Sunburst: a Pearl Harbor Cyber?
In a few years, when the current terrible pandemic is finally under control, 2020 will not be remembered only for the explosion of the COVID-19 infection and its ...
Read
FireEye hacked, by whom?
The US company FireEye, cyber security giant, recently reported having been the victim of hackers, probably supported by a state. Let's remember ...
Read
Little Red Riding Hood and Climbing Beyond the Cloud (How to Become a Hacker)
"Once upon a time there was the real world ..." In a hundred years with this premise we will tell a story to make our great-great grandchildren go to bed. We will start by talking about a dessert ...
Read
Quantum Supremacy to China?
We have long been talking about the evolution of quantum technology applied to computers and cryptographic algorithms. Three years ago we spoke in a ...
Read
Cloud and Confidential Computing ...
For years, cybersecurity experts from private companies and public organizations have faced the ...
Read
Microsoft Pluton, for a safer world
A few days ago Microsoft presented its latest novelty to the world: Microsoft Pluton. Announced in ...
Read
Cyber: has Russia attacked Norway?
Cyberspace is increasingly a territory of conflict, it is now possible to realize this every day, it is no longer talked about ...
Read
Project Ares: cyber and gamification
Research in the cyber field is increasingly pushed and touches all aspects of the fifth domain. Training is one of ...
Read
American elections: Trump's website hacked
We are in time of American elections, in a few days it will be known who will lead the first world power and, of ...
Read
The TIDoS Framework
For Kaly Linux lovers, Metasploit is the framework used to perform Penetration Testing activities ... In the ...
Read
Botnets: one of the biggest threats in cyberspace
Cybersecurity is a shared responsibility, which affects us all. We must start from this assumption of ...
Read
Cyber ​​US-Russia truce ... what if it goes through operations against Trickbot?
According to the Washington Post, the US Cyber ​​Command in recent days has been engaged in an operation ...
Read
Microsoft - the importance of security and privacy in the time of Covid
“Microsoft's goal is to democratize access to technology so that everyone can benefit from it, ...
Read
The United States first in the world in the cyber field
This, in summary, is what is stated in the National Cyber ​​Power Index (NCPI) 2020 of the Belfer Center for Science and ...
Read
The Chief Information Security Officer, what skills?
For many cybersecurity professionals the ultimate career goal is to take on the role of ...
Read
INTEL launches the new generation of Tiger Lake processors
On September XNUMX, Intel announced the release on the market of the new generation of processors, the eleventh, ...
Read

Pages