Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Design of the digital euro

News

Digital euro: cyber security risks? 

9 January 2025

The digital euro is a new frontier in the world of digital payments, designed as an electronic version of cash. According to the official website of the European Central Bank, the digital euro is a modern and free alternative to…

Most Viewed

Latest Posts

Guides

Google history and cyber security

Google's history documents all searches made and websites visited, offering a convenient way to access past information. However, this tool can pose a risk to users' privacy and security. It is therefore essential to regularly manage, view and delete Google history to safeguard one's personal data.

Guides

Secure PEC: risks of Certified Electronic Mail

Certified Electronic Mail (PEC) is an essential service for public bodies and companies, providing secure communications with legal value comparable to registered mail. It uses the TLS 1.2 protocol to protect data transfer and employs digital signatures to ensure that contents have not been altered, thus increasing the integrity and [...]

Guides

How to defend against driver rootkits

Rootkit drivers are an advanced form of malware that installs itself at the kernel level of the operating system, making them particularly dangerous and difficult to detect. These rootkits gain administrator privileges and deeply integrate into the system, modifying drivers to mask their presence and allow other malware to operate [...]

Guides

How to defend against side channel attacks

Side channel attacks are an emerging threat in the field of computer security that exploit the physical behaviour of hardware during cryptographic operations. These attacks look at aspects such as power consumption, execution time and electromagnetic emissions of the device, allowing attackers to obtain sensitive information such as cryptographic keys. [...]

Guides

Protecting your system from DMA attacks 

Direct Memory Access (DMA) attacks pose a serious threat to computer security by exploiting the ability of hardware devices to directly access a system's memory, bypassing the central processor and thus also software security controls. This article discusses the nature of DMA attacks, illustrates how they work, and suggests security [...]

Guides

Memory scraping: attacks and protection

In the IT security landscape, memory scraping represents one of the most insidious threats. This type of attack targets the volatile memory of computer systems, with a particular focus on POS (Point of Sale) systems. Let's take a look at how memory scraping works, what risks it entails, and how [...]

News

Cold boot attack: a real threat

The cold boot attack is a cyber attack that allows sensitive data to be extracted from the RAM memory of a computer by exploiting the fact that the data can persist for a short time after the system has been shut down. The attacker, who must have physical access to [...]

Guides

Rowhammer: vulnerability in DRAM memory 

Rowhammer attacks pose a threat to the security of DRAM memories, which are commonly used in computing devices. This attack technique exploits an inherent vulnerability in DRAM, where repeated accesses to certain rows of memory cells can induce bit flip errors in adjacent rows. This effect is due to the [...]

Guides

Protect your data from bluebugging

Bluebugging is a type of cyber attack that takes advantage of weaknesses in Bluetooth connections to gain unauthorized access to mobile devices. This attack allows hackers to take control of devices, access confidential data and send messages or make calls without the owner's permission. The attack takes place through insecure [...]

Guides

The 5 fundamental aspects of ICT

Cyber security is crucial in our daily lives to protect information systems and personal and corporate data. This discipline is based on five fundamental aspects of ICT, which are the cornerstone of cyber security policies and information protection practices.

News

Bluesnarfing: a silent threat that requires attention 

Bluesnarfing is a little-known but serious cyber security threat consisting of unauthorized access to a device's data via Bluetooth. This attack can occur without the user being aware of it, exploiting vulnerabilities in the Bluetooth protocol to steal sensitive information such as contacts, emails, messages and stored files.

News

Bluejacking: the silent Bluetooth attack 

Bluejacking is an attack that uses Bluetooth technology to send unsolicited messages to nearby devices, such as smartphones and tablets. Although it is not seriously harmful, it can be annoying and compromise privacy. Derived from the combination of ‘Bluetooth’ and ‘hijacking’, bluejacking allows messages to be sent to devices without [...]

To top