07/08/20 | Cyber
The new frontiers of Cyber Security
Could companies, public institutions and even individual citizens pay dearly for the information technology revolution that awaits us? How to counter the dangers that ...
944
Read
03/08/20 | Cyber
Artificial Intelligence for the conversion between programming languages
We are no longer surprised when we hear about Artificial Intelligence, as Alan Turing had predicted 70 years ago, in his essay "Computing Machinery and ...
1128
Read
27/07/20 | Cyber
The future of public key cryptography in the era of quantum computing
In recent years, the academic, industrial and governmental world has invested energy and resources in the field of quantum computation, in computers that exploit phenomena ...
1246
Read
20/07/20 | Cyber
European supercomputers hacked: who is behind it?
Last May some articles appeared that read that several European supercomputers (at least twelve) were hacked, access disabled, and it had to ...
1262
Read
06/07/20 | Cyber
Mystery on the causes of the accident at the nuclear site of Natanz (Iran). Is it really a cyber attack?
Last Friday, July 3, the authorities of the Islamic Republic of Iran admitted that at the Natanz site, located in a desert area about 250 kilometers south of ...
2810
Read
29/06/20 | Cyber
Australia denounces being under cyber attack: is China in the dock?
On June 19, the Australian government publicly denounced that it had been the subject of persistent cyber attacks targeting all areas and services for some time now ...
799
Read
22/06/20 | Cyber
Interview with criminologist Bartolo Danzi: "The network cancels our conscience"
Cybercrime, cyberstalking, cyberpedophilia are very widespread problems that find fertile ground in the lack of awareness of the subject-victim. Know the ...
1187
Read
17/06/20 | Cyber
Cyber Security in Saudi Arabia: review of the main government companies
In the globally widespread scenario of Cyber Crime characterized by criminal activities that exploit components of information technology both hardware and software, the ...
1561
Read
15/06/20 | Cyber
The security of remote access infrastructure and services at the time of Covid-19
On March 29, La Repubblica published an article whose incipit was this: “The current health and social crisis ...
584
Read
15/06/20 | Cyber
Data leak regarding the Minuteman III nuclear ballistic system?
Ransomware, as we know, has been hitting undisturbed for years and it seems that things aren't meant to ...
2017
Read
08/06/20 | Cyber
The town of Weiz, Austria, suffers a ransomware attack
Weiz, an Austrian town of 11.000 inhabitants, was hacked. Public online services suffered data theft ...
1563
Read
03/06/20 | Cyber
FuckUnicorn: ransomware disguised as an Immuni app
The global health emergency has created numerous opportunities to spread cyber offensives. The health infrastructure, ...
1432
Read
28/05/20 | Cyber
The "Ile de France" region relaunches on Artificial Intelligence
France is launched in pursuit of the big names on the path of artificial intelligence. In fact, it is not new ...
452
Read
25/05/20 | Cyber
easyJet: data of 9 million users stolen
The global health emergency has had a huge impact on airlines, forced to suspend many flights ...
5058
Read
08/05/20 | Cyber
Geopolitics, Cyberthreat, Cyber Risk: Impacts, Evaluation, Dynamics and Awareness
The technological impact on social and economic life is not the subject of choices, but it is inevitable, for better or for worse, ...
744
Read
05/05/20 | Cyber
Steganalysis and Machine Learning: a European answer
Steganography is a secret mechanism for encoding information through any means of transmission ....
722
Read
04/05/20 | Cyber
Cyber deterrence: a strategy to limit the threat
Europe is facing a great challenge. His answer still appears weak, linked to logics of ...
607
Read
30/04/20 | Cyber
Analysis of the WhatsApp platform and comparison with the Signal platform
With this article we want to present a study on the WhatsApp platform and the risks associated with it. We have...
5569
Read
29/04/20 | Cyber
Kudankulam Nuclear Power Plant (Kknpp) Cyber security incident: what happened in 2019?
Leafing through an Indian report on the use of new technologies in the defense sector, I happened by chance on a ...
1621
Read
28/04/20 | Cyber
Hackers attacking the US AIR FORCE (thanks)!
The Defense Digital Service is a SWAT team of nerds working to improve technology across the Department of Defense "....
1722
Read