How to compete in Cyberspace: the new approach
On August 25, 2020, a very interesting article was published in Foreign Affairs, by Nakasone and Sulmeyer. The first, Paul Miki Nakasone, commander of the US Cyber ​​...
Read
Trickbot: the most widespread trojan in COVID 19 campaigns
Trickbot malware belongs to the spyware Trojan family, mainly used against banking industry targets. Its first appearance dates back to 2016 and its ...
Read
The new frontiers of Cyber ​​Security
Could companies, public institutions and even individual citizens pay dearly for the information technology revolution that awaits us? How to counter the dangers that ...
Read
Artificial Intelligence for the conversion between programming languages
We are no longer surprised when we hear about Artificial Intelligence, as Alan Turing had predicted 70 years ago, in his essay "Computing Machinery and ...
Read
The future of public key cryptography in the era of quantum computing
In recent years, the academic, industrial and governmental world has invested energy and resources in the field of quantum computation, in computers that exploit phenomena ...
Read
European supercomputers hacked: who is behind it?
Last May some articles appeared that read that several European supercomputers (at least twelve) were hacked, access disabled, and it had to ...
Read
Mystery on the causes of the accident at the nuclear site of Natanz (Iran). Is it really a cyber attack?
Last Friday, July 3, the authorities of the Islamic Republic of Iran admitted that at the Natanz site, located in a desert area about 250 kilometers south of ...
Read
Australia denounces being under cyber attack: is China in the dock?
On June 19, the Australian government publicly denounced that it had been the subject of persistent cyber attacks targeting all areas and services for some time now ...
Read
Interview with criminologist Bartolo Danzi: "The network cancels our conscience"
Cybercrime, cyberstalking, cyberpedophilia are very widespread problems that find fertile ground in the ...
Read
Cyber ​​Security in Saudi Arabia: review of the main government companies
In the globally widespread scenario of Cyber ​​Crime characterized by criminal activities that exploit components of ...
Read
The security of remote access infrastructure and services at the time of Covid-19
On March 29, La Repubblica published an article whose incipit was this: “The current health and social crisis ...
Read
Data leak regarding the Minuteman III nuclear ballistic system?
Ransomware, as we know, has been hitting undisturbed for years and it seems that things aren't meant to ...
Read
The town of Weiz, Austria, suffers a ransomware attack
Weiz, an Austrian town of 11.000 inhabitants, was hacked. Public online services suffered data theft ...
Read
FuckUnicorn: ransomware disguised as an Immuni app
The global health emergency has created numerous opportunities to spread cyber offensives. The health infrastructure, ...
Read
The "Ile de France" region relaunches on Artificial Intelligence
France is launched in pursuit of the big names on the path of artificial intelligence. In fact, it is not new ...
Read
easyJet: data of 9 million users stolen
The global health emergency has had a huge impact on airlines, forced to suspend many flights ...
Read
Geopolitics, Cyberthreat, Cyber ​​Risk: Impacts, Evaluation, Dynamics and Awareness
The technological impact on social and economic life is not the subject of choices, but it is inevitable, for better or for worse, ...
Read
Steganalysis and Machine Learning: a European answer
Steganography is a secret mechanism for encoding information through any means of transmission ....
Read
Cyber ​​deterrence: a strategy to limit the threat
Europe is facing a great challenge. His answer still appears weak, linked to logics of ...
Read
Analysis of the WhatsApp platform and comparison with the Signal platform
With this article we want to present a study on the WhatsApp platform and the risks associated with it. We have...
Read

Pages