Loading...
Cold boot attack warning screen

News

Cold boot attack: a real threat

4 October 2024

The cold boot attack is a cyber attack that allows sensitive data to be extracted from the RAM memory of a computer by exploiting the fact that the data can persist for a short time after the system has been…
Rowhammer attack exploiting system vulnerabilities

Guides

Rowhammer: vulnerability in DRAM memory 

4 October 2024

Rowhammer attacks pose a threat to the security of DRAM memories, which are commonly used in computing devices. This attack technique exploits an inherent vulnerability in DRAM, where repeated accesses to certain rows of memory cells can induce bit flip…
Bluebugging mobile phone attack to access personal data

Guides

Protect your data from bluebugging

3 October 2024

Bluebugging is a type of cyber attack that takes advantage of weaknesses in Bluetooth connections to gain unauthorized access to mobile devices. This attack allows hackers to take control of devices, access confidential data and send messages or make calls…
Scheme with fundamental aspects of ICT

Guides

The 5 fundamental aspects of ICT

3 October 2024

Cyber security is crucial in our daily lives to protect information systems and personal and corporate data. This discipline is based on five fundamental aspects of ICT, which are the cornerstone of cyber security policies and information protection practices.

Most Viewed

Latest Posts

News

Digital operational resilience and the DORA regulation 

This article explores in detail what the DORA regulation is, its implications for companies and supervisory authorities, and how it contributes to digital operational resilience. The DORA (Digital Operational Resilience Act) regulation is a landmark in regulating digital operational resilience in Europe. This regulation was enacted to strengthen cyber security and [...]

News

Man-in-the-middle attack: how to protect yourself 

This article explains the definition of a man-in-the-middle (MITM) attack, known in Italian as “attacco uomo nel mezzo,” is a covert cyber threat where an attacker intercepts and manipulates communications between two unsuspecting parties, posing significant risks to sensitive information. A man-in-the-middle (MITM) attack is one of the most insidious [...]

News

AI and cyber security: cyber security in the AI era 

In this article we explore how AI is revolutionizing cyber security by both enhancing defense mechanisms and enabling hackers to launch more sophisticated and automated attacks, making it increasingly challenging for organizations to protect their systems and data. AI is changing the way organizations handle cyber threats. With the increase [...]

News

Tokenization: a bridge between the real and digital worlds 

In this article, we will explore the meaning of tokenization, its advantages, and its impact on the market. Tokenization is a process that is revolutionizing the world of finance and investment, allowing the representation of physical and digital assets in the form of digital tokens. But what is tokenization, and how [...]

News

Security of SMS and calls 

This article explores various aspects of SMS and call security, highlighting best practices and technologies that can be used to safeguard personal information. By using advanced technologies such as end-to-end encryption and two-factor authentication, we can better protect our communications and personal information. However, it is equally important to remain [...]

News

Blockchain transaction security 

The security of blockchain transactions is a crucial aspect for the adoption and functioning of this revolutionary technology. Being a decentralized structure, blockchain offers a superior level of security compared to traditional centralized systems. But how is the security of transactions on the blockchain actually ensured? In this article, we [...]

News

Physical security and cyber security 

This article explores various physical security measures, examples of physical security in IT systems, and how these intersect with cyber security. Physical security is a crucial element for the protection of IT systems and data. It not only involves protection against physical threats such as theft or vandalism but also includes [...]

News

Ensuring security in operating systems 

Operating system security is a crucial issue in the modern cyber security landscape. Operating systems are the core of every electronic device and must be protected from cyber attacks that can compromise sensitive data and system resources. Therefore, operating system security involves not only data protection but also the prevention [...]

Guides

Guidelines to prevent cyberstalking 

Cyberstalking is a form of harassment that takes place through electronic means such as the internet, social networks, and messaging. With the increased use of the internet and social media, this phenomenon has become more widespread, causing significant problems for victims. In this article, we will explore the meaning of [...]

News

Security in online booking systems 

The security of online booking systems is increasingly important given the growing number of transactions occurring on digital platforms. Online booking software offer convenience and accessibility 24/7 but also pose significant fraud risks. For example, there have been over 16,000 online scams in Italy, making it essential for users to [...]

News

National security: cyber intelligence and strategies 

In the digital age, national security extends far beyond physical borders. Cyber intelligence plays a crucial role in protecting critical infrastructures and public administrations, as well as in preventing cyber threats. With the advancement of digital technologies, cyber threats have become increasingly sophisticated and pervasive, requiring an integrated and proactive [...]

News

Cyber security in public administration 

Cyber security in public administration is a top priority for ensuring the protection of data and services provided to citizens. The increasing digitalization of the Italian public administration has made it essential to adopt minimum ICT security measures. These measures, established by the Presidency of the Council of Ministers through [...]

To top