Loading...
Cold boot attack warning screen

News

Cold boot attack: a real threat

4 October 2024

The cold boot attack is a cyber attack that allows sensitive data to be extracted from the RAM memory of a computer by exploiting the fact that the data can persist for a short time after the system has been…
Rowhammer attack exploiting system vulnerabilities

Guides

Rowhammer: vulnerability in DRAM memory 

4 October 2024

Rowhammer attacks pose a threat to the security of DRAM memories, which are commonly used in computing devices. This attack technique exploits an inherent vulnerability in DRAM, where repeated accesses to certain rows of memory cells can induce bit flip…
Bluebugging mobile phone attack to access personal data

Guides

Protect your data from bluebugging

3 October 2024

Bluebugging is a type of cyber attack that takes advantage of weaknesses in Bluetooth connections to gain unauthorized access to mobile devices. This attack allows hackers to take control of devices, access confidential data and send messages or make calls…
Scheme with fundamental aspects of ICT

Guides

The 5 fundamental aspects of ICT

3 October 2024

Cyber security is crucial in our daily lives to protect information systems and personal and corporate data. This discipline is based on five fundamental aspects of ICT, which are the cornerstone of cyber security policies and information protection practices.

Most Viewed

Latest Posts

News

Are cyber security and cyber resilience the same thing? 

The distinction between cyber security and cyber resilience is crucial for the protection of information systems. Although often used synonymously, they represent distinct but complementary concepts. Cyber security focuses on preventing cyber attacks through measures such as firewalls, antivirus and multi-factor authentication. Best practices include strict security policies, continuous staff [...]

Guides

What HTTPS means and why it is important 

HTTPS is a secure version of the HTTP protocol, used to transfer encrypted data between the user's browser and the website server, protecting sensitive information. This article explains the meaning of HTTPS, how it works, how to activate it and the differences between HTTP and HTTPS.

News

National Cybersecurity Agency (ACN) 

The Agency for National Cybersecurity (ACN) is crucial for protecting Italy's digital infrastructure. Established by a decree-law at the initiative of the Prime Minister and the Council of Ministers, the ACN responds to the need for inter-ministerial coordination for cybersecurity. The agency acts as a national cybersecurity authority, protecting national [...]

News

Tabletop exercises in cyber crisis management 

Tabletop exercises are essential for cyber crisis management, enabling companies to prepare for and respond effectively to cyber incidents. Also known as tabletop security, these simulations of crisis scenarios take place in a controlled environment, allowing participants to develop and test contingency plans without risking real operations. Tabletop exercises consist [...]

Guides

Antivirus: which one to choose to protect your device 

This article explores how to choose the best antivirus to protect your device from new cyber threats, comparing free and paid versions. Computer security is crucial for Windows PC users, as viruses and malware threaten computer performance and data privacy. A good antivirus must offer real-time protection against various threats [...]

Guides

Parental control: what it is, available options, and how to activate it 

In this article, we will explore what parental control is, the most popular systems available, and how to activate it on various devices.  Parental control is an essential tool for parents who want to protect their children while using digital devices such as smartphones, tablets, and computers. This tool allows [...]

Guides

Incognito browsing and cyber security 

The dependence on technology and Artificial Intelligence makes cybersecurity a priority for many. A common tool to protect online privacy is incognito browsing. This article explores incognito mode, its advantages, limitations and role in cybersecurity. Incognito browsing, offered by browsers such as Google Chrome, Mozilla Firefox and Microsoft Edge, allows [...]

News

Service Level Agreements (SLAs) in IT Management 

Service Level Agreements (SLAs) are essential contractual tools to ensure the quality of service provided by service providers to their customers. An SLA clearly and precisely defines service metrics such as response times and uptime that the service provider must adhere to, ensuring a high level of service performance. 

Guides

Protect your smartphone: tips for mobile security

In this article we will explore most of the practices to ensure a high level of mobile device security, with particular attention to Android device users. In Italy, the use of smartphones is extremely widespread, with the number of mobile devices exceeding the number of inhabitants. According to recent data, there [...]

News

Network segmentation: what it is and how it works 

In this article, we will explain what network segmentation is, how it works, and its benefits, especially in terms of security and network traffic management. Network segmentation is a strategy that enhances the security of IT infrastructures. Network segmentation involves dividing a larger network into smaller, more manageable parts called segments. [...]

News

What is the shared responsibility model 

This article explains, that the shared responsibility model is a cornerstone of cloud security, delineating the distinct roles of cloud service providers and customers in protecting data and maintaining security within the cloud environment. The shared responsibility model is a fundamental concept in cloud security. It describes the division of [...]

News

Digital operational resilience and the DORA regulation 

This article explores in detail what the DORA regulation is, its implications for companies and supervisory authorities, and how it contributes to digital operational resilience. The DORA (Digital Operational Resilience Act) regulation is a landmark in regulating digital operational resilience in Europe. This regulation was enacted to strengthen cyber security and [...]

To top