The Army Study Center starts the debate on digital security
Exposure to cyber dangers is steadily increasing. The countless amount of data that must be stored and protected are aimed at cybercrime, espionage, Social ...
Read
Do you need transparency in the tracing of infections?
A few days ago the news came that an App was selected for tracking COVID 19 patients. This App, called "Immuni", belongs to the Italian company of ...
Read
Parinacota and cyber resilience
In the collective imagination, volcanoes are often linked to the image of power and destruction. In Roman mythology, for example, Volcanos is the deity who ...
Read
STRATCOM at the time of COVID 19
In the previous article we were left with some questions on the subject, which we will now resume: - How to recognize STRATCOM? - How to defend yourself? - What are the relations with the ...
Read
What happens in cyberspace as a consequence of the coronavirus
The COVID 19 pandemic is a health challenge for humanity, but that does not prevent its use for criminal, espionage or flu activities. The report of the ...
Read
Bonus for the covid-19 emergency: the sad analysis of the INPS portal ...
What happened yesterday, the first day on which it was possible to request the bonus that the state assigned to self-employed workers for the covid-19 emergency, is unbelievable. Was...
Read
Cyber ​​risk: "a situation of unprecedented gravity"
Cyber ​​security is not a challenge, nor is it certainly the challenge of the 4.0st century, but it is a journey. What, on the other hand, constitutes a threat for the XNUMX society ...
Read
Sandbox: what is it and how safe are they?
Who doesn't know Don Abbondio? For us Italians he is an unforgettable figure. Little little man hiding behind words with dark meanings. Well, some "experts of ...
Read

rheinmetal defense
Why don't Apple and Linux have viruses?
In this period it is difficult to talk about computer viruses, but I try the same as the topic interests many ...
Read
Cyber ​​deterrence. In the absence of nuclear power ...
We all know, or at least understand, that there are weapons that do not need to be used to carry out their ...
Read
My name is Security, Cyber-Security
Images of guns and beautiful girls chase each other on the big screen while the famous jingle plays. Then, a ... appears
Read
Mastercard: European Cybersecurity in Belgium
Mastercard, an American company with registered office in New York and branches in Belgium and Great Britain, has announced that it has ...
Read
What you need to know about cyberspace to live well: personalized advertising
Thank you all! The previous article on cyber incidents met with some success with the public, very ...
Read
Why is there no universal antivirus?
For as long as computer viruses have existed, there have also been antivirus. This is an obvious reality. But for what reason ...
Read
What you need to know about cyberspace to live well: "the cyber incident"
It happens more and more often that friends or simple acquaintances ask me questions about the cyber world. Often yes ...
Read
The untold story of the cyber attack on the 2018 Olympics
On January 1863, XNUMX Pierre De Coubertin was born, the man to whom we must say thank you for having reintroduced the Olympics ...
Read
The Privacy Guarantor fines Eni Gas e Luce (Egl) for 11,5 million euros
The press release of a few days ago with which the Guarantor for the protection of ...
Read
West Point Army Cyber ​​Institute
Who hasn't heard, at least once, of the famous American military institute of West Point? If only ...
Read
Ransomware: a bit of history. The dark side of cryptology
For some time now we have been hearing about ransomware: one of the best known attacks, perhaps because it consists in putting ...
Read
USA - Iran, a new hybrid war with an uncertain future
“There is a silent war. The weapons are invisible, the deployments fluid and difficult to identify ....
Read

Pages