Loading...

Guides

Vishing: what it is and how to protect yourself from this form of fraud 

Vishing, short for ‘voice phishing’, is a form of scam that uses telephone calls to obtain personal and sensitive information from victims. Fraudsters often pose as representatives of banks or other reputable institutions, using ‘spoofing’ techniques to make their numbers appear legitimate. During calls, they convince victims to reveal data [...]

Guides

What is smishing and how to protect yourself

In recent years, the term "smishing" has gained increasing relevance in the world of cybercrime. But what is smishing? The word is a combination of "SMS" and "phishing" and represents a form of phishing that uses text messages (short message service or SMS) to deceive users and obtain sensitive information. [...]

Guides

Protecting your business website from cross-site request forgery

Cross site request forgery (CSRF) is an attack that exploits the sessions of authenticated users to send fraudulent HTTP requests without their consent. Using techniques such as hidden forms on malicious sites, attackers can, for example, induce users to transfer money unintentionally. In this paper, strategies to prevent CSRF attacks [...]

Guides

Protecting your business website from Cross-Site Scripting 

Cross-site scripting (XSS) is a cybersecurity vulnerability that allows attackers to insert malicious scripts into web pages, exposing users to risks such as stealing session cookies, manipulating web content, and controlling accounts. These attacks can severely compromise the security of corporate websites, expose sensitive data, and damage a company's reputation. [...]

Guides

Clearing the cache for enhanced cyber security

Cache is a temporary memory used by operating systems and browsers to store data and files from visited web pages, such as images and scripts. This mechanism is used to reduce loading times during subsequent visits, improving browsing efficiency. When a user visits a page for the first time, the [...]

Guides

How to protect your business website from SQL injection 

SQL injection is a type of cyber attack that exploits vulnerabilities in a web application's SQL commands to manipulate the database, allowing access to sensitive data, modification or deletion of data, and potentially complete control of the server. This attack can be particularly damaging to companies, such as ecommerce companies, [...]

Guides

The best antivirus apps for your mobile device

Table of contents In 2024, protecting your mobile device is essential due to the increasing online threats. Cyber attacks are on the rise, making it crucial to have a good antivirus app to keep sensitive data on your smartphone or tablet safe. This article will explore some of the best [...]

Guides

How to become a hacker: basic guide for aspiring hackers

Table of contents The term hacker is often associated with images of individuals who hack computer systems for malicious purposes. However, the world of hackers is much broader and more complex. Hackers can be divided into several categories depending on their intentions and the techniques they use, including: In this [...]

Guides

The network security key for a hotspot

A hotspot network security key is essential to protect your wireless connection when setting up a hotspot on a mobile device or router. A hotspot is an access point that allows wireless devices to connect to the Internet, available in public, personal or mobile versions. Public hotspots are often accessible [...]

Guides

What is a spyware and how to effectively protect yourself

Spyware is malicious software that secretly installs itself on computers or mobile devices to monitor users' activities and collect sensitive data such as login credentials and credit card numbers. It spreads mainly through vulnerabilities in operating systems or through deceptive downloads. This article will discuss how spyware works, its different [...]

Guides

Adware: what it is, how to remove it, and how to protect yourself

Adware, or ‘advertising software’, is a type of software that displays advertisements as the main method of generating revenue. It is often found in installation packages of free software and can be installed either voluntarily or unintentionally. While some adware is transparent about its function, others can install themselves without [...]

Guides

What is LockBit Ransomware and how does it work?

LockBit Ransomware is a very dangerous malware that encrypts files in victims' operating systems, rendering them inaccessible and demanding a ransom for their recovery. First appearing in 2019, it has quickly established itself as one of the most serious threats in cybersecurity. LockBit's attacks are notable for their speed and [...]

Guides

What are trojans and how to protect yourself 

Trojans are a type of malware that masquerades as a legitimate application to trick users into downloading and installing them. Although they do not replicate themselves like viruses, Trojans are very dangerous because once installed, they can take control of the operating system and perform malicious actions. This malware can [...]

Guides

Pharming and phishing: what’s the difference?

Pharming and phishing are two forms of cyber attack with similar objectives but different methodologies. Phishing involves deceiving users through fraudulent communications, such as e-mails or messages, to induce them to provide personal information. Pharming, on the other hand, manipulates the DNS address of a site to redirect users to [...]

Guides

Whaling: spear phishing of the “big fish”

Whaling, or phishing whaling, is an insidious cyber threat that focuses on specific targets, the ‘big fish’. Unlike traditional phishing, which indiscriminately targets many people, whaling targets high-profile individuals within an organisation, such as executives and CEOs.

Guides

Smart speakers and security: how and where to position them

Smart speakers such as Amazon Echo, Google Home, and Apple HomePod are becoming increasingly popular for their voice recognition capabilities and integration with streaming services. It is essential to position them correctly to maximize audio quality and security. Strategic placement ensures effective voice recognition and protects the Wi-Fi network and [...]

Guides

TLS Encryption: what it is and how it works 

TLS (Transport Layer Security) encryption is an essential security protocol for ensuring the protection of sensitive information transmitted over the internet. Derived from the previous SSL (Secure Sockets Layer) protocol, TLS offers significant improvements in terms of security and performance, making it the preferred choice for protecting web connections. 

Guides

Data Retention Policies: security and compliance 

Data retention policies are crucial in the management of personal and corporate data, being critical both for regulatory compliance, such as GDPR, and for ensuring the security of information and privacy of individuals. This article will explore the meaning of data retention, the importance of data retention policies, regulatory guidelines [...]

Guides

Security of payments on Amazon 

Amazon is one of the largest and most popular e-commerce platforms in the world, and payment security is a major concern for both customers and the company itself. In this article, we will explore:  How Amazon ensures the security of payments  The different payment options available  How to protect your [...]

Guides

What HTTPS means and why it is important 

HTTPS is a secure version of the HTTP protocol, used to transfer encrypted data between the user's browser and the website server, protecting sensitive information. This article explains the meaning of HTTPS, how it works, how to activate it and the differences between HTTP and HTTPS.

Guides

Antivirus: which one to choose to protect your device 

This article explores how to choose the best antivirus to protect your device from new cyber threats, comparing free and paid versions. Computer security is crucial for Windows PC users, as viruses and malware threaten computer performance and data privacy. A good antivirus must offer real-time protection against various threats [...]

Guides

Parental control: what it is, available options, and how to activate it 

In this article, we will explore what parental control is, the most popular systems available, and how to activate it on various devices.  Parental control is an essential tool for parents who want to protect their children while using digital devices such as smartphones, tablets, and computers. This tool allows [...]

Guides

Incognito browsing and cyber security 

The dependence on technology and Artificial Intelligence makes cybersecurity a priority for many. A common tool to protect online privacy is incognito browsing. This article explores incognito mode, its advantages, limitations and role in cybersecurity. Incognito browsing, offered by browsers such as Google Chrome, Mozilla Firefox and Microsoft Edge, allows [...]

Guides

Protect your smartphone: tips for mobile security

In this article we will explore most of the practices to ensure a high level of mobile device security, with particular attention to Android device users. In Italy, the use of smartphones is extremely widespread, with the number of mobile devices exceeding the number of inhabitants. According to recent data, there [...]

To top