Loading...
Blog2017-11-23T10:08:16+00:00
2803, 2019

Risk management and cybersecurity attacks

In the financial sphere, the risk is associated with uncertainty (possibility of fluctuations in value, both in a positive and negative sense). In cybersecurity, the events of interest are always linked to losses of value, but maintain the character [...]

2603, 2019

Cybersecurity & Economic Forum of Delphi

Delphi Economic Forum, one of the most prestigious Greek annual events took place between Thursday, February 28 and Sunday, March 3, 2019 aiming to identify the main global trends, assess their implications and review the resulting challenges and policy options [...]

2003, 2019

Only 1/3 of the employees trust their digital skills

According to a study of the Vodafone Institute, that investigates the acceptability of new technologies in Europe, Asia and the USA, there is a global shortage of digital skill. In fact, only 29% of the employees consider their digital skills [...]

2003, 2019

Revenge porn: an open problem about privacy

In these days the problem of the revenge porn has been brought again to the attention of the italians by the case of Giulia Sarti. For the ill-unaware some intimate photos of the ex five-stars deputee Giulia Sarti has been [...]

2003, 2019

Cybersecurity act approved by European parliament

This Tuesday (13-03-2019) the European Parliament has approved the adoption of new norms to implement a certification system for Cybersecurity in the European Union. This system, aptly named Cybersecurity act, aims to guarantee that products and services sold on the [...]

2003, 2019

Hunt for security flaws with Windows Exploit Suggester

This software allows you to analyze the operating system to identify vulnerabilities and exploits that hackers can use to attack. How vulnerable are we to a cyber attack? Knowing it exactly is almost impossible. All we can do is to [...]

2003, 2019

What is cryptojacking?

Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on people’s devices (computers, smartphones, tablets or even servers), without their consent or knowledge, and uses the machine’s resources to secretly mine cryptocurrencies. Cryptocurrency is a form of [...]