Cyber ​​US-Russia truce ... what if it goes through operations against Trickbot?
According to the Washington Post, the US Cyber ​​Command in recent days has been engaged in a preventive operation targeting the Trickbot botnet. The operation ...
Read
Microsoft - the importance of security and privacy in the time of Covid
"Microsoft's goal is to democratize access to technology, so that everyone can benefit from it, keeping the protection of privacy and the ...
Read
The United States first in the world in the cyber field
This, in summary, is what is stated in the National Cyber ​​Power Index (NCPI) 2020 of the Belfer Center for Science and International Affairs. The study conducted examines ...
Read
The Chief Information Security Officer, what skills?
For many cybersecurity professionals, the ultimate career goal is to assume the role of Chief Information Security Officer (CISO). That of CISO is ...
Read
INTEL launches the new generation of Tiger Lake processors
On September XNUMX, Intel announced the release of the new generation of processors, the eleventh, called "Tiger Lake". The house of Santa Clara announces ...
Read
How to compete in Cyberspace: the new approach
On August 25, 2020, a very interesting article was published in Foreign Affairs, by Nakasone and Sulmeyer. The first, Paul Miki Nakasone, commander of the US Cyber ​​...
Read
Trickbot: the most widespread trojan in COVID 19 campaigns
Trickbot malware belongs to the spyware Trojan family, mainly used against banking industry targets. Its first appearance dates back to 2016 and its ...
Read
The new frontiers of Cyber ​​Security
Could companies, public institutions and even individual citizens pay dearly for the information technology revolution that awaits us? How to counter the dangers that ...
Read

  
Artificial Intelligence for the conversion between programming languages
We are no longer surprised when we hear about Artificial Intelligence, as Alan Turing had predicted by now ...
Read
The future of public key cryptography in the era of quantum computing
In recent years, the academic, industrial and government world has invested energy and resources in the field of ...
Read
European supercomputers hacked: who is behind it?
Last May some articles appeared that read that several European supercomputers (at least twelve) are ...
Read
Mystery on the causes of the accident at the nuclear site of Natanz (Iran). Is it really a cyber attack?
On Friday, July 3, the authorities of the Islamic Republic of Iran admitted that at the Natanz site, ...
Read
Australia denounces being under cyber attack: is China in the dock?
On 19 June, the Australian government publicly denounced that it had been the subject of attacks for some time ...
Read
Interview with criminologist Bartolo Danzi: "The network cancels our conscience"
Cybercrime, cyberstalking, cyberpedophilia are very widespread problems that find fertile ground in the ...
Read
Cyber ​​Security in Saudi Arabia: review of the main government companies
In the globally widespread scenario of Cyber ​​Crime characterized by criminal activities that exploit components of ...
Read
The security of remote access infrastructure and services at the time of Covid-19
On March 29, La Repubblica published an article whose incipit was this: “The current health and social crisis ...
Read
Data leak regarding the Minuteman III nuclear ballistic system?
Ransomware, as we know, has been hitting undisturbed for years and it seems that things aren't meant to ...
Read
The town of Weiz, Austria, suffers a ransomware attack
Weiz, an Austrian town of 11.000 inhabitants, was hacked. Public online services suffered data theft ...
Read
FuckUnicorn: ransomware disguised as an Immuni app
The global health emergency has created numerous opportunities to spread cyber offensives. The health infrastructure, ...
Read
The "Ile de France" region relaunches on Artificial Intelligence
France is launched in pursuit of the big names on the path of artificial intelligence. In fact, it is not new ...
Read

Pages