The site of the Senate, the Ministry of Defense, the portal of the Higher Institute of Health, that of the Orio al Serio airport in Bergamo, Genoa and Rimini. Over 50 sites have been hit in recent days by the cyber attack launched by pro-Russian hackers Killnet. An unprecedented offensive that raised the level of guard in the [...]

read more

In 2016, the FBI turned to an external company to find a way to unlock the iPhone that belonged to the killer of the San Bernardino massacre, a shooting in a Californian disabled center that left 14 victims. At the time, Apple denied access to data to the police, precisely to demonstrate the safety of the equipment to its customers. The FBI, [...]

read more

Most state hacking now targets cell phones, not personal computers, as was the case until 2015. According to the Wall Street journal, experts say cell phones have become, in operations this year, state hacking, a far more profitable target than personal computers. I [...]

read more

Temporary blockade for websites accused of spreading fake news and ban on mobile phones in the classroom for compulsory school children. With two bills, French President Emmanuel Macron tries to keep his electoral promises in terms of digital information and education. While the ok at first reading came from [...]

read more

Facebook would have signed agreements with dozens of manufacturers of mobile phones and other electronic devices, with the relative sharing of some user data, the New York Times wrote last Sunday. The company founded by Mark Zuckerberg, the NYT writes, has data sharing agreements dating back to 2010 with at least four Chinese manufacturers, including [...]

read more

Many Google employees signed, last April, an open letter to CEO Sundar Pichai asking to block the Maven project. The program that uses the artificial intelligence platform to analyze the images captured by the Pentagon's drones. About twenty technicians and managers have even resigned. The 9 million dollar contract [...]

read more

The defense of the banking world against computer fraud is even more effective: in 2017, in fact, banks operating in Italy invested over 300 million euros to combat this criminal phenomenon, including through staff training initiatives, awareness campaigns for customers and a careful and continuous monitoring action, reconciling protection, confidentiality [...]

read more

Two of the most commonly used systems for encrypting email - PGP and S / Mime - are vulnerable to attacks that can read encrypted content. This was revealed last night by some European researchers who will publish all the technical details tomorrow. In the meantime, however, they urge users not to use these encryption methods from their clients [...]

read more

A huge amount of Facebook ads bought by Russian groups during the 2016 US elections sought to instill divisions and discord over racial issues. And the closer we got to the election date, the more the ads insisted on this topic. This was reported by the USA Today newspaper which analyzed the more than 3500 advertisement (ads) [...]

read more

The Deputy Director General of Public Security - Central Director of the Criminal Police, Prefect Nicolò D'Angelo, and the Deputy Director General of the Italian Banking Association, Gianfranco Torriero, today signed the renewal of the "Protocol of understanding for the prevention of crime in the Bank ". Present were the representatives of the Banking Institutions operating in the area, the Director of [...]

read more

The agreement signed today in Rome in the presence of the Chief of Police and Director General of Public Security, Franco Gabrielli, and of the Chief Executive Officer and General Manager of Terna, Luigi Ferraris The agreement between the Police of State and Terna, the operator of the electricity transmission grid in Italy, for the [...]

read more

NATO's cyber blue team won Locked Shields 2018, the world's largest cyber-attack exercise, in Tallin, Estonia, last week. Organized by NATO's Center of Excellence for Cyber ​​Defense Cooperation (CCD COE), the exercise engaged participants to respond to and counter high-intensity attacks [...]

read more

(by Alessandro Rugolo) The WebStresser.org site was deactivated yesterday following a joint operation by the Dutch police, the British National Crime Agency, Europol and law enforcement agencies from various countries around the world. On the Webstresser.org site, subscription "services" of DDoS (Distributed Denial of service) were sold starting from a minimum of 15,00 [...]

read more

Facebook's concern for data privacy is growing after it emerged that the world's largest social network tracks people regardless of having an account. Privacy concerns have flooded Facebook since it admitted last month that information on millions of users [...]

read more

(by Alessandro Rugolo) Also this year in Tallin (but in fact throughout Europe) will be held, as usual, the largest Cyber ​​exercise in the world: Locked Shield. Using the information from the previous exercises and doing a minimum of OSINT let's see what it could be focused on. What do we know? - we know that last year the exercise was held [...]

read more

Facebook said yesterday that the personal information of 87 million users, mostly in the United States, may have been improperly exchanged with political consultancy Cambridge Analytica, compared to a previous estimate of more than 50 million on average. Chief Executive Mark Zuckerberg said on a conference call [...]

read more

(by Roberta Preziosa) The recent advances made in the field of radio interception are pushing the intelligence agencies of many countries to identify new methods of (tempest) shielding of electronic equipment. The Israeli research centers (Ben Gurion University) have discovered that the "Air gap" and the old generation shielding systems are not in [...]

read more

Less than half of Americans trust Facebook under U.S. privacy laws, after a Reuters / Ipsos poll released today illustrating the challenge faced by the social media network following the personal information scandal. The survey, conducted from Wednesday to Friday, also found that fewer [...]

read more

Anyone tempted to participate in the #DeleteFacebook campaign after the personal data of millions of users has fallen into the hands of a political consultancy is likely to be monitored by the social network, which tracks nearly 30% of global web traffic. And Google (GOOGL.O), in various forms, obscures 64 percent [...]

read more

Facebook, in the words of its founder Zuckerberg, said that its users' data cannot be completely safe. In an interview with the Wall Street Journal, the CEO of Facebook explained that the investigation launched by the group, after the scandal associated with the alleged abuses of Cambridge Analytica will help to identify and discourage who [...]

read more

Facebook CEO Mark Zuckerberg said today that his company has made mistakes in processing data belonging to 50 million users and has promised tougher measures to restrict developers' access to the data. The largest social media network in the world is facing increasing scrutiny by [...]

read more

The president of the authority for the protection of personal data Antonello Soro was interviewed on Radio Radicale on the question of Cambridge Analytica and the probability that also in Italy there had been an involvement of the English company in the recent political elections. Soro in his interview says he has no elements to say whether even in [...]

read more

Britain is investigating whether Facebook has done enough to protect data after a political consultant hired by Donald Trump improperly accessed information on 50 million Facebook users, Information Commissioner Elizabeth Denham said today. Denham is awaiting a warrant to investigate the company's offices in [...]

read more

Cambridge Analytica, accused and investigated for the affair of private data stolen from the network on Facebook and used to influence important electoral campaigns. The company collected the personal data of over 50 million social media users, violating its policy and influencing the US presidential elections, Brexit and other election campaigns, according to [...]

read more

Security, protection and confidentiality. Banks respond effectively to the security needs of their customers, through technological safeguards, staff training initiatives and awareness campaigns. In fact, every year Italian banks spend over 250 million euros on IT security and thanks to this intense work and the precious collaboration with [...]

read more

Fake news spreads almost at the speed of light to put it mildly. This is what happens on Twitter, according to the results of a study by the Massachusetts Institute of Technology published in the journal Science. The researchers analyzed the spread of true and false news through Twitter between 2006 and 2007. The […]

read more

By e-mail now we get everything: documentation from public and private bodies, from the tax authorities, from local administrations, from organizations of various kinds. There are several official communications that reach us thanks to e-mail, especially via mobile, and digital fraud is on the agenda. Cyber ​​criminals all over the world have [...]

read more

Faced with the growing degree of interconnection that characterizes modern societies and a threat that has continued to be increasingly sophisticated and persistent, the national cyber architecture has undergone changes aimed at further strengthening the country's cyber defense capabilities ". The traditional presentation [...] was held this morning at Palazzo Chigi

read more

The hybrid war waged by Russia is turning into a true global conflict. This was stated by the head of the Ukrainian state, Petro Poroshenko, during his speech at the Munich security conference. "Today, we have no choice but to acknowledge that the hybrid war waged by Russia is gradually [...]

read more

(by Ciro Metaggiata) Being able to orient oneself correctly in that enormous “gray area” that cyber-space is becoming is a very complex undertaking. Being able to establish who really is the perpetrator and who the instigator of a cyber attack, especially in the context of judicial investigations, is even more so. However, in the context of the increasingly vast and varied world [...]

read more

Pyeongchang Winter Olympics organizers confirmed Sunday that the Games fell victim to a cyber attack during Friday's opening ceremony but refused to reveal the source. The systems of the Games, including internet and television services, were affected by the hack two days ago, but the organizers have [...]

read more

US security personnel allegedly paid at least $ 100 to an unidentified Russian who promised compromising material on US President Donald Trump. The investigation was reported in the New York Times, in an article where he explains that it was a scam because the information was "unverified and most likely [...]

read more

The popularity of Bitcoin and the emergence of around 1.500 other digital coins or tokens have drawn more hackers into the cryptocurrency cyber, expanding opportunities for crime and fraud, according to cybersecurity firm Digital Shadows, in a report on Thursday. Cybercriminals follow the evolution of cryptocurrencies in an unregulated world in [...]

read more

James Mattis, American Defense Minister, wants to ban the use of cell phones in the Pentagon, in analogy with what was decided for the West Wing of the Biancan House. What worries the US Minister of Defense are the reports on security, which would have been put at risk by a fitness application in which the [...]

read more

President Donald Trump's national security team is examining all options for countering China's threat of spying on US phone calls, including those from the government. The option is 5G super-fast wireless networking, an administration official said today. The official, confirming the existence of a relationship of [...]

read more

One of Japan's largest digital currency exchanges reports it has lost around $ 534 million (£ 380 million) of virtual money in a hacking attack on its network. This is Coincheck where deposits and withdrawals have been suspended for all crypto-currencies except Bitcoin as it has evaluated [...]

read more

The EU commissioner for digital, Mariya Gabriel, in an interview with Qn talked about fake news and relations with upcoming electoral commitments We want to deal with fake news, in particular fake news on social and political issues. The elections in Italy will be monitored on a par with other countries. Since 2015 we have been acting against the campaigns [...]

read more

If you're planning a weekend on Netflix while chilling out with loved ones, be aware that the branding is used by scammers to frame unsuspecting users! Phishers have been targeting this popular brand for a year, trying to trick users into handing over their credentials and payment information, […]

read more

Twitter decided to study Russian interference during the 2016 U.S. election, and said today it will notify some of its users that they have been exposed to content generated by an alleged Russian propaganda service. The company said it would email 677.775 people in the US who followed, [...]

read more

Kane Gamble aged 15, English, in these days at trial in London, his story looks like a movie and maybe it will become one. From Leicester, from his little room he entered the top secret systems of the CIA and FBI. From June 2015 to February 2016 Ken managed to steal passwords, information on the private life of [...]

read more

Recently, the topic of fake news has become a hot topic, especially in the period of political elections: Facebook and Twitter are under accusation, which over the years have proved to be perfect sounding boards for false news. With the aim of obtaining easy views through the publication of sensational news, publishers publish hoaxes aiming to earn [...]

read more

A malicious virus has been found to have turned smartphones running Android into spy devices that for years allowed “someone” to steal data from millions of users of all types, including military, activists and government officials. His name is Pallas and the hacker group that [...]

read more

(by Massimiliano D'Elia) General Pasquale Preziosa, President of PRP Channel, dealt extensively days ago with the issue of microdrons and their dual development, a technology that immediately attracted important fringes of terrorist groups. origin of a video that left everyone dismayed. Last November we [...]

read more

An agreement was signed between the Guarantor for the protection of personal data and the Postal Police aimed at strengthening the system of protection against minors from the dangers of the web. The protocol, signed by the president of the Guarantor for the protection of personal data Antonello Soro and by the head of the police Franco Gabrielli, formalizes [...]

read more

Speaking at the International Cybersecurity Conference, FBI Director Christopher Wray highlighted an increase in nation-state attacks and strong encryption that limits office investigations. An increase in nation-state-sponsored cyber-intrusion attacks, an increasing frequency of "mixed threats" involving nation-states hiring criminals [...]

read more

The Chinese bitcoin giant Bitmain Technologies, in a note to a Swiss newspaper, announced that it is expanding in Switzerland in a series of fundamental operations to expand its presence in the country. Bitmain Switzerland was registered in Zug, Switzerland at the end of December, according to master data filed on Wednesday. The [...]

read more

Young graduates and graduates with skills and experience in the fields of research, monitoring, analysis and contrast of the cyber threat, with particular analytical skills in the cyber sector with reference to geopolitical contexts, but also knowledge of tools and techniques related to data mining, all 'web analysis, social media and skills in the structured analysis of [...]

read more

Apple, in order not to lose an important slice of the market, has adapted to the new laws and has confirmed that iCloud services in China will be managed by a Chinese company starting next month. For the Cupertino company, this is a necessary decision to act in line with Chinese regulations. Apple contacted [...]

read more

First the damage, then the insult. The patch distributed by Microsoft to fix the 'Meltdown' and 'Specter' security flaws no longer causes computers with AMD processors to boot once installed. The Redmond giant admitted the problem with a press release on its website and temporarily stopped releasing the update for [...]

read more

A Californian cybersecurity company has found software that installs a code for the Monero cryptocurrency and sends coins to a server at a North Korean university. If so, it is yet another sign that North Korea could be looking for new ways to revitalize its economy, gripped by the [...]

read more

Macs, iPhones and iPads are not immune to the vulnerabilities found in microprocessors that have led to a widespread alarm about the risk of data theft by hackers. Apple reported this, according to the BBC. In recent days, a race against time has begun to process the [...]

read more

The recent vulnerabilities are confirmation of how digital security depends on a long series of factors, which involve not only the correct use of the software and adequate user training, as we often hear, but also the robustness of the hardware " . This is what Luca Sambucci, Operations Manager of Eset Italia points out, interviewed by Adnkronos after [...]

read more

Researchers have discovered security gaps stemming from central processing units, better known as chips or microchips, which could allow the hacking of data stored on computers and networks. No data breaches have been reported so far. What are the mistakes? There are two separate security flaws known as Meltdown and Specter. Meltdown [...]

read more

Russia is looking for financial engineering solutions to circumvent the imposed sanctions that inevitably tie Moscow's economy. Here, then, is the “cryptorube”: an electronic currency to be used to carry out international trade, circumventing sanctions. This was reported by the Financial Times citing a speech by Sergei Glazev, economic adviser to President Vladimir Putin. On [...]

read more

Ransomware and malware that will multiply, clouds and critical infrastructures under attack, and a special focus by hackers on mobile devices and the Internet of Things. According to Check Point, these are the issues to be kept under control during 2018. According to analysts of the Israeli company specializing in IT security, ransomware was a hen [...]

read more

(by Massimiliano D'Elia) The 2017 hacker attacks seem to have come out of an American action and espionage film. If 2017 was notable for the escalation and proliferation of cyberattacks, everyone is wondering what will happen in 2018? The so-called WannaCry attack in May was the beginning of the fear of massive attacks [...]

read more

(Alessandro Rugolo) One of the businesses of the moment seems to be investing in cryptocurrency. The best known are Bitcoin, Ripple, Ethereum, Litecoin and about 700 other types of digital currency, among the latter there is also one called Youbit, owned by Yapian, a South Korean company. In the last year it seems that the South Koreans have discovered [...]

read more

At the end of November it was revealed that Uber would pay $ 100.000 for the cyber attacks received, to erase the hacked data obtained and hidden for over a year. In the wake of the news, Uber's head of security, Joe Sullivan, had to resign from the company. The violation of Uber highlights the fact [...]

read more

(by Alessandro Rugolo) What factors determine cyber risk? What happens to a society that is too digitized? These questions arise spontaneously in those involved in cyber security, including Chris Inglis, deputy director of the NSA between 2006 and 2014, expressed his concerns in the article published on December 13 in The Atlantic, entitled: “Will [...]

read more

The forthcoming activation of the two 2016 regulatory devices for cyber security and data protection, scheduled for May 2018, calls for a reflection on the complex logic and underlying application intersections that could lead to a revolution in the national and European digital market as we know it. The quantitative scenario of the attackers signals worrying trends: 80 for [...]

read more

Donald Trump Advisor for Homeland Security and Counterterrorism Thomas Bossert was peremptory in saying North Korea is responsible for the 'Wannacry' cyberattack, which paralyzed the whole world last May. In an op-ed in the Wall Street Journal, Bossert explains that the North Korea indictment is based on "hard evidence". [...]

read more

ABI - in collaboration with ABI Lab, State Police, CERTFin and Feduf - promotes the responsible use of technology and payment instruments with a guide that illustrates the basic rules for concluding e-commerce transactions without risk, using cards carefully and access the channels safely from a PC or mobile phone [...]

read more

Do you remember the Occhionero brothers and the story of the thousands of government mails spied and cataloged? The process began today. At least 10 years of imprisonment for the crime of those who procure news concerning the security of the State. Accusations of political espionage for the engineer-manager Giulio Occhionero, in prison since January 9, and the [...]

read more

(by Alessandro Rugolo) Did the United States of America carry out cyber activities to sabotage North Korea's missile capabilities? So it seems, at least according to what has already been reported since April in an article by journalists Julian Ryall, Nicola Smith and David Millward which appeared in the British The Telegraph. The analysis of what happened was presented [...]

read more

The digital economy alone generates nearly a third of China's gross domestic product. This is supported by a report presented by Beijing at the annual Chinese conference on cyberspace. The report presented yesterday in Wuzhen by the Chinese State Academy for Cyberspace Studies claims that last year China's digital economy generated a [...]

read more

Leonardo and MVP Tech announced at the Dubai Air Show (12-16 November) the start of a collaboration to provide integrated cyber security solutions in the United Arab Emirates. The two companies will offer government organizations and businesses customized cybersecurity services including intelligence, risk management, analysis, design, development and system certification. Founded [...]

read more

Since January 2018, Google has been gearing up to provide its users with new tools of protection and persuasion when they are redirected to unwanted or fictitious content. Google will do this through Chrome, also giving site owners the ability to check for breaches on their platforms. The violations of the sites occur [...]

read more

The privacy of people whose telephone, telematic and environmental wiretapping are not relevant to the investigations is safeguarded. This is the cardinal principle of the legislative decree, approved by the Council of Ministers, which intervenes on the provisions regarding the interception of conversations or communications. "The abuse is put to an end" said Prime Minister Paolo Gentiloni. In fact, the text [...]

read more

In my last article: "Artificial Intelligence: opportunity or risk?", I tried to highlight some aspects of what is happening in the field of Artificial Intelligence in the world; this is because, like all news, it has positive aspects but also potentially dangerous aspects AND THEREFORE YOU SHOULD KNOW AND KEEP IN MIND FOR THE FUTURE! Now, for [...]

read more

The 5G network is essential for new technology, when it comes to virtual reality and augmented reality that will change our daily life in at least six vital sectors: media, school, work, social interactions, tourism and retail. But for this to happen, the response times of the networks must be improved. It is the result of the 'Merged Reality' study, [...]

read more

Despite quarterly revenues above $ 10 billion, Facebook lost share yesterday after the market, reversing course from an initial rally fueled by profits soaring 79% and revenue increased by 47% annually. Investors have punished the title of the social network which, first through its CEO Mark Zuckerberg [...]

read more

According to reports from Nova, it is now increasingly difficult to distinguish the boundaries between online and offline and TV series and reality. Just as you attribute a 'Like' on social networks or stars on review sites to evaluate a hotel or restaurant, so soon you will assign scores to citizens based on the [...]

read more

There are production companies in Italy that are able to convey to the world an image of high responsibility and professionalism. Surely one of this reality is represented by DGS Group. DGS is a private group founded in 1997, which operates in the ICT sector providing high-tech professional solutions of value, through the combination of a [...]

read more

The Italian Minister of the Interior Marco Minniti in an interview with "La Stampa", spoke of the risk of terrorism, after the fall of Raqqa and of cyber security, in the light of the forthcoming political elections and the danger of interference on the network by foreign nations. Some traits of the interview are reported. On cybersecurity we have put in [...]

read more

NATO is a political-military alliance, whose soft-power is increasingly important. This was stated by the president of the NATO Parliamentary Assembly, Paolo Alli, during the “Transatlantic Forum on Russia” conference, held today at the Center for American Studies. Alli recalled how the 2014 agreement on defense spending set at 2 percent [...]

read more

Trump is about to appoint Kirstjen Nielsen, Kelly's former chief of staff at the DHS (Department of Homeland Security), where he will fill the post Kelly left vacant last July. According to two officials inside the Administration and three external but particularly involved in the matter, the appointment of Kirstjen Nielsen will be made official [...]

read more

US-Russia, Moscow interfered in the presidential elections but there is no evidence of Trump's involvement as President and Vice President of the US Senate Intelligence Commission, Republican Richard Burr and Democrat Mark Warner have revealed that the investigations confirm the "interference" Russians in the 2016 presidential elections, but admitted that there is currently no proof [...]

read more

The personal smartphone of White House Chief of Staff John Kelly was reportedly hacked, remaining compromised for months. This was reported by the Politico.com newspaper, which cites three government officials as a source. The infiltration was reportedly discovered in the summer, when Kelly took the phone to White House tech support complaining about software update malfunctions. The problem […]

read more

Cyber: Russians succeeded in the impossible, stealing US classified information directly from the NSA Two authoritative American newspapers wrote last Thursday that in 2015 Russian hackers stole US cyber secrets directly from the National Security Agency (NSA) after a employee had put information on their home computer. As previously reported by the Wall [...]

read more

You don't need to be an IT expert to understand the basics of cybersecurity. Even small steps can make a difference in keeping your device and your data safe. All this because cyber crimes, understood as fraud, scams, identity theft and network violations continue to increase, day by day [...]

read more

Defense: China and the US together for cybersecurity The first cycle of Sino-US dialogues on cybersecurity has opened in Washington. "A step forward between the two countries in the application of a law on virtual security but also a reason for the growth of bilateral cooperation and adequate management of the differences between the two parties", [...]

read more

A poll last year showed that more than half of American companies said they had suffered a hacker attack. The investigation carried out by Zogby Associates, on behalf of the insurance company HSB, which offers cyber insurance, showed that following the attacks these companies had to spend large sums of money to repair [...]

read more