
25/05/20 | Cyber
easyJet: data of 9 million users stolen
The global health emergency has had a huge impact on airlines, forced to suspend many flights and, therefore, to drastically reduce their earnings. But...
5036
Read

08/05/20 | Cyber
Geopolitics, Cyberthreat, Cyber Risk: Impacts, Evaluation, Dynamics and Awareness
The technological impact on social and economic life is not the subject of choices, but it is inevitable, for better or for worse, to limit oneself only to suffering this radical and inescapable ...
670
Read

05/05/20 | Cyber
Steganalysis and Machine Learning: a European answer
Steganography is a secret mechanism for encoding information through any means of transmission. Its use has been known since ancient Greece even if it is ...
640
Read

04/05/20 | Cyber
Cyber deterrence: a strategy to limit the threat
Europe is facing a great challenge. His response still appears weak, linked to logics of economic or political survival in the absence of leadership. New ...
591
Read

30/04/20 | Cyber
Analysis of the WhatsApp platform and comparison with the Signal platform
With this article we want to present a study on the WhatsApp platform and the risks associated with it. We also tried to make a comparison with the Signal platform ....
5155
Read

29/04/20 | Cyber
Kudankulam Nuclear Power Plant (Kknpp) Cyber security incident: what happened in 2019?
Leafing through an Indian report on the use of new technologies in the defense sector, I happened by chance on a short article that spoke of the investigations conducted in the ...
1602
Read

28/04/20 | Cyber
Hackers attacking the US AIR FORCE (thanks)!
The Defense Digital Service is a SWAT team of nerds working to improve technology across the Department of Defense ”. This phrase stands out on the Defense Digital homepage ...
1707
Read

27/04/20 | Cyber
Swiss Crypto AG scandal and some security considerations for Italy to come
We have all heard of how dangerous the Huawei Company is thanks to the use of 5G technology and in fact it is on the American blacklist as apparently ...
1033
Read

22/04/20 | Cyber
Possible leak for Gates Foundation, WHO and Wuhan Institute
In the last few hours, news of a possible cyber attack on ...
1117
Read

21/04/20 | Cyber
The Army Study Center starts the debate on digital security
Exposure to cyber dangers is steadily increasing. The countless amount of data that must be kept ...
315
Read

20/04/20 | Cyber
Do you need transparency in the tracing of infections?
A few days ago the news that an App has been selected for tracking COVID 19 patients. This App, ...
627
Read

14/04/20 | Cyber
Parinacota and cyber resilience
In the collective imagination, volcanoes are often linked to the image of power and destruction. In ...
577
Read

08/04/20 | Cyber
STRATCOM at the time of COVID 19
In the previous article we were left with some questions on the subject, which we now resume: - How to recognize the ...
776
Read

06/04/20 | Cyber
What happens in cyberspace as a consequence of the coronavirus
The COVID 19 pandemic is a health challenge for humanity, but this does not prevent its use for carrying out activities ...
646
Read

02/04/20 | Cyber
Bonus for the covid-19 emergency: the sad analysis of the INPS portal ...
What happened yesterday, the first day on which it was possible to claim the bonus that the state assigned to workers ...
2137
Read

30/03/20 | Cyber
Cyber risk: "a situation of unprecedented gravity"
Cyber security is not a challenge, nor is it certainly the challenge of the XNUMXst century, but it is a journey. That ...
855
Read

23/03/20 | Cyber
Sandbox: what is it and how safe are they?
Who doesn't know Don Abbondio? For us Italians he is an unforgettable figure. Little little man hiding behind ...
1394
Read

16/03/20 | Cyber
Why don't Apple and Linux have viruses?
In this period it is difficult to talk about computer viruses, but I try the same as the topic interests many ...
12457
Read

09/03/20 | Cyber
Cyber deterrence. In the absence of nuclear power ...
We all know, or at least understand, that there are weapons that do not need to be used to carry out their ...
677
Read

02/03/20 | Cyber
My name is Security, Cyber-Security
Images of guns and beautiful girls chase each other on the big screen while the famous jingle plays. Then, a ... appears
1360
Read