easyJet: data of 9 million users stolen
The global health emergency has had a huge impact on airlines, forced to suspend many flights and, therefore, to drastically reduce their earnings. But...
Read
Geopolitics, Cyberthreat, Cyber ​​Risk: Impacts, Evaluation, Dynamics and Awareness
The technological impact on social and economic life is not the subject of choices, but it is inevitable, for better or for worse, to limit oneself only to suffering this radical and inescapable ...
Read
Steganalysis and Machine Learning: a European answer
Steganography is a secret mechanism for encoding information through any means of transmission. Its use has been known since ancient Greece even if it is ...
Read
Cyber ​​deterrence: a strategy to limit the threat
Europe is facing a great challenge. His response still appears weak, linked to logics of economic or political survival in the absence of leadership. New ...
Read
Analysis of the WhatsApp platform and comparison with the Signal platform
With this article we want to present a study on the WhatsApp platform and the risks associated with it. We also tried to make a comparison with the Signal platform ....
Read
Kudankulam Nuclear Power Plant (Kknpp) Cyber ​​security incident: what happened in 2019?
Leafing through an Indian report on the use of new technologies in the defense sector, I happened by chance on a short article that spoke of the investigations conducted in the ...
Read
Hackers attacking the US AIR FORCE (thanks)!
The Defense Digital Service is a SWAT team of nerds working to improve technology across the Department of Defense ”. This phrase stands out on the Defense Digital homepage ...
Read
Swiss Crypto AG scandal and some security considerations for Italy to come
We have all heard of how dangerous the Huawei Company is thanks to the use of 5G technology and in fact it is on the American blacklist as apparently ...
Read

  
Possible leak for Gates Foundation, WHO and Wuhan Institute
In the last few hours, news of a possible cyber attack on ...
Read
The Army Study Center starts the debate on digital security
Exposure to cyber dangers is steadily increasing. The countless amount of data that must be kept ...
Read
Do you need transparency in the tracing of infections?
A few days ago the news that an App has been selected for tracking COVID 19 patients. This App, ...
Read
Parinacota and cyber resilience
In the collective imagination, volcanoes are often linked to the image of power and destruction. In ...
Read
STRATCOM at the time of COVID 19
In the previous article we were left with some questions on the subject, which we now resume: - How to recognize the ...
Read
What happens in cyberspace as a consequence of the coronavirus
The COVID 19 pandemic is a health challenge for humanity, but this does not prevent its use for carrying out activities ...
Read
Bonus for the covid-19 emergency: the sad analysis of the INPS portal ...
What happened yesterday, the first day on which it was possible to claim the bonus that the state assigned to workers ...
Read
Cyber ​​risk: "a situation of unprecedented gravity"
Cyber ​​security is not a challenge, nor is it certainly the challenge of the XNUMXst century, but it is a journey. That ...
Read
Sandbox: what is it and how safe are they?
Who doesn't know Don Abbondio? For us Italians he is an unforgettable figure. Little little man hiding behind ...
Read
Why don't Apple and Linux have viruses?
In this period it is difficult to talk about computer viruses, but I try the same as the topic interests many ...
Read
Cyber ​​deterrence. In the absence of nuclear power ...
We all know, or at least understand, that there are weapons that do not need to be used to carry out their ...
Read
My name is Security, Cyber-Security
Images of guns and beautiful girls chase each other on the big screen while the famous jingle plays. Then, a ... appears
Read

Pages