
31/08/20 | Cyber
How to compete in Cyberspace: the new approach
On August 25, 2020, a very interesting article was published in Foreign Affairs, by Nakasone and Sulmeyer. The first, Paul Miki Nakasone, commander of the US Cyber ...
641
Read

10/08/20 | Cyber
Trickbot: the most widespread trojan in COVID 19 campaigns
Trickbot malware belongs to the spyware Trojan family, mainly used against banking industry targets. Its first appearance dates back to 2016 and its ...
840
Read

07/08/20 | Cyber
The new frontiers of Cyber Security
Could companies, public institutions and even individual citizens pay dearly for the information technology revolution that awaits us? How to counter the dangers that ...
895
Read

03/08/20 | Cyber
Artificial Intelligence for the conversion between programming languages
We are no longer surprised when we hear about Artificial Intelligence, as Alan Turing had predicted 70 years ago, in his essay "Computing Machinery and ...
881
Read

27/07/20 | Cyber
The future of public key cryptography in the era of quantum computing
In recent years, the academic, industrial and governmental world has invested energy and resources in the field of quantum computation, in computers that exploit phenomena ...
1033
Read

20/07/20 | Cyber
European supercomputers hacked: who is behind it?
Last May some articles appeared that read that several European supercomputers (at least twelve) were hacked, access disabled, and it had to ...
1254
Read

06/07/20 | Cyber
Mystery on the causes of the accident at the nuclear site of Natanz (Iran). Is it really a cyber attack?
Last Friday, July 3, the authorities of the Islamic Republic of Iran admitted that at the Natanz site, located in a desert area about 250 kilometers south of ...
2793
Read

29/06/20 | Cyber
Australia denounces being under cyber attack: is China in the dock?
On June 19, the Australian government publicly denounced that it had been the subject of persistent cyber attacks targeting all areas and services for some time now ...
793
Read

22/06/20 | Cyber
Interview with criminologist Bartolo Danzi: "The network cancels our conscience"
Cybercrime, cyberstalking, cyberpedophilia are very widespread problems that find fertile ground in the ...
976
Read

17/06/20 | Cyber
Cyber Security in Saudi Arabia: review of the main government companies
In the globally widespread scenario of Cyber Crime characterized by criminal activities that exploit components of ...
1205
Read

15/06/20 | Cyber
The security of remote access infrastructure and services at the time of Covid-19
On March 29, La Repubblica published an article whose incipit was this: “The current health and social crisis ...
394
Read

15/06/20 | Cyber
Data leak regarding the Minuteman III nuclear ballistic system?
Ransomware, as we know, has been hitting undisturbed for years and it seems that things aren't meant to ...
1984
Read

08/06/20 | Cyber
The town of Weiz, Austria, suffers a ransomware attack
Weiz, an Austrian town of 11.000 inhabitants, was hacked. Public online services suffered data theft ...
1539
Read

03/06/20 | Cyber
FuckUnicorn: ransomware disguised as an Immuni app
The global health emergency has created numerous opportunities to spread cyber offensives. The health infrastructure, ...
1417
Read

28/05/20 | Cyber
The "Ile de France" region relaunches on Artificial Intelligence
France is launched in pursuit of the big names on the path of artificial intelligence. In fact, it is not new ...
420
Read

25/05/20 | Cyber
easyJet: data of 9 million users stolen
The global health emergency has had a huge impact on airlines, forced to suspend many flights ...
5018
Read

08/05/20 | Cyber
Geopolitics, Cyberthreat, Cyber Risk: Impacts, Evaluation, Dynamics and Awareness
The technological impact on social and economic life is not the subject of choices, but it is inevitable, for better or for worse, ...
614
Read

05/05/20 | Cyber
Steganalysis and Machine Learning: a European answer
Steganography is a secret mechanism for encoding information through any means of transmission ....
564
Read

04/05/20 | Cyber
Cyber deterrence: a strategy to limit the threat
Europe is facing a great challenge. His answer still appears weak, linked to logics of ...
545
Read

30/04/20 | Cyber
Analysis of the WhatsApp platform and comparison with the Signal platform
With this article we want to present a study on the WhatsApp platform and the risks associated with it. We have...
4791
Read