
29/12/21 | Cyber
Deepfakes: the art of creating "fake authors" at the time of artificial intelligence
In recent years, the development and implementation of deep neural networks has accelerated the development of applications capable of recognizing in ...
970
Read

27/12/21 | Cyber
Vulnerability ALARM: CVE-2021-44228, "Apache Zero-Day Log4j" for friends!
Once again the world of computer technology is shocked by the discovery of a vulnerability spread across a huge amount of computer systems, according to some ...
2580
Read

20/12/21 | Cyber
CyberSecurity and Health
Cyber attacks on healthcare infrastructures are intensifying in number and quality and are increasingly successful, bringing to the fore the need for ...
756
Read

16/12/21 | Cyber
Fighting the bad guys in a structured way
The world of technology, more particularly that of cyber security, is now full of acronyms and acronyms that make a dialogue between practitioners in the sector seem almost a ...
601
Read

13/12/21 | Cyber
Ethical Biohacking and Supply Chain
Since I was a boy I have been intrigued by Bioengineering so much that it has become the specialization of my course of study in Electronic Engineering. Later, my ...
545
Read

09/12/21 | Cyber
With SICYNT 250 children are more cyber-safe
December 7, 2021, 6.40 AM, somewhere near a Milan that for the most part still sleeps, considering it is the day of the Patron Saint Ambrose. Temperature close to ...
650
Read

08/12/21 | Cyber
Smart Working and Cybersecurity
Smart Working, a very popular term in the last year and a half, is the new way of working that involves different categories of workers due to the current health crisis ...
448
Read

07/12/21 | Cyber
NATO Strategic Concept: the renewal process begins
Is the security context defined in November 2010 in the NATO Strategic Concept document still valid? What are the new challenges that over the course of more than ten years, you ...
760
Read

06/12/21 | Cyber
Keraunos: the interception-proof satellite link
"One of the projects that will contribute to the superiority of our armed forces". This is what the minister said ...
912
Read

01/12/21 | Cyber
Cyber Deterrence: UK and India fight together. Italy?
Today's war, the one that is fought with no holds barred in cyberspace (or through it), has not been won since ...
618
Read

29/11/21 | Cyber
Near Field Communication: the cyber threat we carry in our pockets
As part of the prevention of attacks on industrial information assets carried out during a ...
1109
Read

22/11/21 | Cyber
The Smishing, this unknown
Black Friday is approaching, a commercial event of American origin but which due to globalization ...
1535
Read

18/11/21 | Cyber
Trojan Source Attack, what is it?
How about if it were possible to trick compilers into producing binaries other than logic ...
829
Read

15/11/21 | Cyber
Cybercriminals vs Pirates
We live in really interesting times: exactly ten years ago the US Department of Defense defined the domain ...
461
Read

08/11/21 | Cyber
Network systems automation techniques
The reference to the use of automation techniques and possibly AI (Artificial Intelligence) has become ...
373
Read

02/11/21 | Cyber
The Strange Case of Spongebob's GreenPass
A couple of days ago, while I was having breakfast, I received a message on my smartphone saying “Good morning ....
3527
Read

25/10/21 | Cyber
NATO Strategy for Artificial Intelligence
On 21 October 2021, the defense ministers of NATO countries approved and released, for the first time, the ...
866
Read

20/10/21 | Cyber
October, Cyber Security month
Online Defense and SICYNT united in the month of Cyber Security invite you to share the ABC of Security on ...
429
Read

18/10/21 | Cyber
The impact of artificial intelligence on intelligence analysis
Let's go back to the discussion, only mentioned in a previous article, relating to the role of Artificial Intelligence in ...
663
Read

14/10/21 | Cyber
The evolution of the Operating Systems
The computer as we know it, that is a small and relatively inexpensive device, capable of ...
3240
Read