Loading...
Cold boot attack warning screen

News

Cold boot attack: a real threat

4 October 2024

The cold boot attack is a cyber attack that allows sensitive data to be extracted from the RAM memory of a computer by exploiting the fact that the data can persist for a short time after the system has been…
Rowhammer attack exploiting system vulnerabilities

Guides

Rowhammer: vulnerability in DRAM memory 

4 October 2024

Rowhammer attacks pose a threat to the security of DRAM memories, which are commonly used in computing devices. This attack technique exploits an inherent vulnerability in DRAM, where repeated accesses to certain rows of memory cells can induce bit flip…
Bluebugging mobile phone attack to access personal data

Guides

Protect your data from bluebugging

3 October 2024

Bluebugging is a type of cyber attack that takes advantage of weaknesses in Bluetooth connections to gain unauthorized access to mobile devices. This attack allows hackers to take control of devices, access confidential data and send messages or make calls…
Scheme with fundamental aspects of ICT

Guides

The 5 fundamental aspects of ICT

3 October 2024

Cyber security is crucial in our daily lives to protect information systems and personal and corporate data. This discipline is based on five fundamental aspects of ICT, which are the cornerstone of cyber security policies and information protection practices.

Most Viewed

Latest Posts

Guides

Whaling: spear phishing of the “big fish”

Whaling, or phishing whaling, is an insidious cyber threat that focuses on specific targets, the ‘big fish’. Unlike traditional phishing, which indiscriminately targets many people, whaling targets high-profile individuals within an organisation, such as executives and CEOs.

News

WPA encryption: security and protection of wireless networks

Wi-Fi Protected Access (WPA) encryption and its evolution WPA2 are fundamental security protocols to protect wireless networks. WPA replaced the less secure WEP protocol by introducing dynamic encryption keys that change regularly, making it difficult for hackers to intercept communications. WPA2 further improved security by adopting the AES (Advanced Encryption [...]

News

What is the European Union Agency for Cybersecurity?

The European Union Agency for Cybersecurity (ENISA), founded in 2004 and based in Athens, is an essential body for cybersecurity in the European Union. Its task is to raise the levels of network and information security in the member states. ENISA works with national cybersecurity authorities, EU institutions and other [...]

Guides

Smart speakers and security: how and where to position them

Smart speakers such as Amazon Echo, Google Home, and Apple HomePod are becoming increasingly popular for their voice recognition capabilities and integration with streaming services. It is essential to position them correctly to maximize audio quality and security. Strategic placement ensures effective voice recognition and protects the Wi-Fi network and [...]

News

Chief Information Security Officer (CISO): who they are and what they do

The Chief Information Security Officer (CISO) is a crucial figure within companies, responsible for cybersecurity. His or her main job is to protect sensitive data and develop strategies to combat cyber threats and ensure system resilience. The CISO must possess advanced technical skills, a deep understanding of cyber threats, and [...]

News

AES Encryption: what it is and how it works 

AES (Advanced Encryption Standard) is a symmetric block encryption algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted in 2001 by the US National Institute of Standards and Technology (NIST) as the successor to DES (Data Encryption Standard). This algorithm, widely used in areas ranging from military [...]

Guides

TLS Encryption: what it is and how it works 

TLS (Transport Layer Security) encryption is an essential security protocol for ensuring the protection of sensitive information transmitted over the internet. Derived from the previous SSL (Secure Sockets Layer) protocol, TLS offers significant improvements in terms of security and performance, making it the preferred choice for protecting web connections. 

Guides

Data Retention Policies: security and compliance 

Data retention policies are crucial in the management of personal and corporate data, being critical both for regulatory compliance, such as GDPR, and for ensuring the security of information and privacy of individuals. This article will explore the meaning of data retention, the importance of data retention policies, regulatory guidelines [...]

News

Anonymization of personal data: techniques and benefits

Anonymization techniques are essential to ensure that sensitive information cannot be attributed to an identified or identifiable natural person. In this article we will explore in detail: What it means to anonymize data, The techniques used, The benefits, The challenges associated with this practice.

News

The principle of data minimization 

Data minimization is one of the core principles of personal data protection, especially in the context of the GDPR (General Data Protection Regulation). This principle ensures that personal data collected and processed are adequate, relevant, and limited to what is necessary in relation to the purposes for which they are [...]

Guides

Security of payments on Amazon 

Amazon is one of the largest and most popular e-commerce platforms in the world, and payment security is a major concern for both customers and the company itself. In this article, we will explore:  How Amazon ensures the security of payments  The different payment options available  How to protect your [...]

News

Crisis Management Team vs. Emergency Response Team

Crisis management is a crucial discipline for any organization, large or small, that aims to preserve its reputation and respond effectively to crisis situations. The crisis management team and the emergency response team are two fundamental components of this discipline, each with a specific role in mitigating the negative impacts [...]

To top