Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Loading...
Design of the digital euro

News

Digital euro: cyber security risks? 

9 January 2025

The digital euro is a new frontier in the world of digital payments, designed as an electronic version of cash. According to the official website of the European Central Bank, the digital euro is a modern and free alternative to…

Most Viewed

Latest Posts

Guides

NFC and security: protecting contactless payments 

NFC (Near Field Communication) is a technology that has revolutionized digital payments by enabling quick and contactless transactions by bringing two compatible devices close together. However, despite its convenience, this technology raises significant cybersecurity issues that must be carefully considered to protect users' sensitive data. NFC is a short-range communication technology [...]

Guides

Antivirus quarantine: what it is and what it’s for? 

Antivirus quarantine is a fundamental function in computing, but many users do not fully understand its purpose and how to use it correctly. This article will explain in detail what antivirus quarantine is, how it works, and why it is essential for protecting your system. Antivirus quarantine is a function designed [...]

News

Non-repudiation of data: A key aspect of cyber security

In the realm of cyber security, one of the fundamental aspects of protecting information is the concept of non-repudiation of data. This often-overlooked concept plays a crucial role in ensuring that none of the parties involved in an electronic transaction can deny having carried it out. But what exactly is [...]

News

The dangers of social network poisoning

Social networks have become a fundamental part of our daily lives. However, the growing use of social networks has also led to the emergence of new cyber security threats, one of which is social network poisoning. But what exactly is social network poisoning, and why does it pose such a [...]

News

History of the phreakers: phone phreaking and hacking

In the vast world of cyber security, there is a figure that left an indelible mark: the phreaker. But who are the phreakers, and why have they played such a significant role in the history of telecommunications? The term "phreaker" comes from the combination of “phone” and “hacker,” and is [...]

News

Network topology and cyber security 

The topology of a network is nothing more than the physical and logical arrangement of the nodes and links that form a network. It defines the structure of the connections between the various devices in a computer network, such as computers, servers and other nodes. This structure can be organised [...]

News

Polymorphic malware: an evolving threat

Polymorphic malware represents one of the most sophisticated and insidious cyber threats in the field of computer security. This type of malware is particularly dangerous because it is able to modify its code dynamically. This makes it difficult, if not impossible, for traditional anti-malware programmes to detect it. But what [...]

News

IT security protection: what it is and how to defend data 

IT security, practically synonymous with cyber security, has become a crucial element for the protection of personal and corporate data.  In simple terms, it refers to the set of measures and practices designed to safeguard computer systems and sensitive information from unauthorized access, damage, or attacks by cyber criminals.  With the rise [...]

News

Eavesdropping: what it is and what it does 

The term "eavesdropping" may not be widely known, but it plays a crucial role in the realm of cyber security.  But what is eavesdropping? In short, it is a cyber attack where a malicious actor intercepts communications between two or more parties, often without them noticing. Eavesdropping (a translation of [...]

News

GPS spoofing: what it is and how to protect yourself 

GPS spoofing is a growing threat in the world of computer security, capable of causing serious problems for both individuals and organizations. But what is GPS spoofing and how can we protect ourselves from it? It is the practice of sending false GPS signals (GPS spoofing) to a GPS receiver, [...]

News

Stakeholder attack on a network: what it is and how to defend yourself against it 

A new type of attack is emerging among cyber threats: the stakeholder attack on a network. n stakeholder attack occurs when one of the stakeholders voluntarily or involuntarily facilitates an intrusion into an organization's computer systems. Unlike traditional cyber attacks, which often come from cyber criminals outside the company, in [...]

News

DNS spoofing: what it is and how to protect yourself 

DNS spoofing, also known as DNS cache poisoning, is a malicious attack in which hackers manipulate the Domain Name System (DNS) to redirect traffic from legitimate websites to malicious ones. This type of attack can result in severe cyber security risks, exposing users to data theft, credential compromise, and other [...]

To top