The first meeting of the G7 Rome/Lyon Group under the Italian Presidency was held in Rome in recent days at the Ministry of Foreign Affairs and International Cooperation. The Department of Public Security has the high responsibility of presiding over this forum, jointly with the Ministry of Foreign Affairs and International Cooperation. The Group, which has the […]

read more

by Editorial Staff According to the Times, concerns are arising in England about national security following a multimillion-dollar agreement with a Chinese company to supply a supercomputer to a British government body. The Science and Technology Facilities Council (STFC) of the UK Research and Innovation agency has announced that it will install a Lenovo supercomputer at the site […]

read more

by Editorial Staff "Cybersecurity in the era of AI" is the title of the 3rd edition of CyberSec, the international conference promoted and organized by the newspaper Cybersecurity Italia. The conference which will take place in Rome on 6 and 7 March 2024, through the contribution of national and international cyber security experts, intends to provide important insights into the evolutions [...]

read more

Thousands of planes grounded in America. The Notice to Air Mission - NOTAM - system went haywire for just under half an hour and it is the second time this has happened within a few days. Biden considered the hypothesis of a hacker attack asking the Secretary of Transportation Buttigieg to conduct a [...]

read more

Google is developing a free moderator for smaller websites that they can use to identify and remove terrorist material. A response to new legislation in the UK and the European Union forcing internet companies to do more to tackle illegal content. The software was developed in collaboration […]

read more

The CEO of one of the major European insurers has warned that cyber attacks, such as natural disasters, can no longer be insured, in view of the uncontrolled increase in the malicious activities of hackers. In recent years, insurance industry executives have sounded the alarm about systemic risks, such as pandemics and climate change, which put […]

read more

The hypersonic weapons used in the war in Ukraine, the use of killer drones and laser weapons require effective and very challenging responses that only superpowers can face due to their cost. Several scientific programs and some applications in the military industry have shown that to fight the wars of the present but above all of the [...]

read more

In a small town in western Ukraine, intelligence officers crowd around a cluster of screens. The interface of the Russian government websites appears, from where files are downloaded as hackers try to identify any possible weaknesses in the infrastructure. This is the new "top secret" headquarters of the Cyber ​​Intelligence Division of the [...]

read more

The Government of Israel opposes the decision of the US Department of Commerce to have blacklisted two Tel Aviv companies, dedicated to programming software for digital surveillance, because they are found guilty of having acted in activities contrary to national security or interests of US foreign policy. The [...]

read more

In an era where computer violations and data thefts become more and more frequent and risk immobilizing the economic and social functions of a state, our country has equipped itself with a National Cybersecurity Agency, with the aim of protecting national interests. in the field of cybersecurity and [...]

read more

(by Massimiliano D'Elia) All over the world there are large-scale hacker attacks, in some cases, targeting critical infrastructures causing serious problems that are difficult to solve immediately. A phenomenon that has shown, in a disarming way, the extreme vulnerability of States in the face of the virtual threat whose principal (often of state origin) is [...]

read more

“Italy arrived late on the topic of cybersecurity”, the comment of the Delegated Authority for the security of the Republic Franco Gabrielli at the hearing of the Constitutional Affairs and Transport commissions of the Chamber. The next step is the conversion into law of the decree that regulates the Agency. In this regard Gabrielli specified: "We can no longer afford to waste time on an issue that may not [...]

read more

Leonardo was chosen by the Qatar Computing Research Institute (QCRI) to provide a Cyber ​​Range & Training system for training operators and assessing the resilience of infrastructures to cyber attacks. The contract, signed with the Qatar Foundation for Education, Science and Community Development - the organization to which the research institute belongs [...]

read more

(by Vito Coviello - Head of AIDR) Interoperability, connectivity - permanent connectivity, IT security - Cyber ​​security: these are all terms that have now become part of the common language, perennially connected and perhaps even a little more alone when we "detach" from social networks network. But this life of ours perpetually connected has not taken away the desire to travel [...]

read more

The dl on cyber security is state law. Yesterday the majority approved the yellow-red government decree, the opposition abstained. The law, writes Il Sole 24Ore, provides for the creation of a national "perimeter" where, within four months, public administrations, national bodies and operators - public and [...]

read more

Yesterday the Council of Ministers approved the decree law on the perimeter of national cyber security. The provision is based on a system to guarantee the highest level of protection to public administrations, national, public and private entities and operators from cyber attacks. A system that, in essence, will have to protect the national strategic apparatuses. The novelty of [...]

read more

Chris Demchak, a professor at the US Naval War College wrote an article on Defense One, where he deals with the dangers in cyber space by "devious" adversaries of Western democracies. The American professor links the security of national strategic infrastructures to their economic development. Cyber ​​in the military world is expanding in democracies [...]

read more

Leonardo has signed a contract with the NATO agency “NCIA” (NATO Communication and Information Agency) for the extension of the information protection services for the Alliance for a further 18 months. The new agreement, called "NCIRC - CSSS" (NATO Security Incident Response Capability - Cyber ​​Security Support Services), ensures the continuity of the cyber security activities provided by [...]

read more

The agreement between the State Police and Alitalia was signed today in Rome for the prevention and fight against computer crimes involving information systems and services of particular importance for the country. The agreement, signed by the Chief of Police-Director General of Public Security, Franco Gabrielli, and by the Extraordinary Commissioners [...]

read more

According to a cybersecurity company and the European Union, Russia "would have prepared the way" for the seizure of the Ukrainian navy ships, launching a major cyber attack on government sites and disinformation to public opinion. A private cybersecurity company claimed that Moscow would launch a series of cyber attacks against servers [...]

read more

(by Admiral Giuseppe De Giorgi) How many hacker attacks are carried out every day all over the world, and of these how many are directed towards Italy, towards our companies or our ministries? The Russian Kaspersky, one of the most famous cybersecurity companies, recently released a very attractive tool on the web called “Kaspersky [...]

read more

Last May, while the President of the Republic Mattarella gave his peremptory "no" to the candidacy of Paolo Savona as Minister of the Economy, more than 400 new accounts were created on Twitter in a few minutes.

read more

The Postal and Communications Police has received numerous reports in recent days relating to the receipt of strange e-mails, also in English, which in the subject contain our e-mail address and our password, current or past and in the message inform that, precisely thanks to the knowledge of our password, the sender, hidden or with [...]

read more

(by Alessandro Rugolo) Someone will remember that last summer President Trump announced the promotion to Unified Combatant Command of USCYBERCOM, giving the maximum possible recognition to the new combat dimension: cyberspace. We have also seen how the rest of the world is moving towards a reorganization that takes into account the new and increased threats, both by proceeding with the drafting of documents [...]

read more

Temporary blockade for websites accused of spreading fake news and ban on mobile phones in the classroom for compulsory school children. With two bills, French President Emmanuel Macron tries to keep his electoral promises in terms of digital information and education. While the ok at first reading came from [...]

read more

The “Cyber ​​Eagle 2018”, a cyber defense exercise organized by the Logistics Command of the Air Force with the aim of training units of the Armed Force to respond adequately to cyber threats, ended today. The exercise, while remaining faithful to the predominantly procedural approach of the previous editions, was enriched with technical and operational contents, measuring itself against complex scenarios [...]

read more

(by Roberta Preziosa) The recent advances made in the field of radio interception are pushing the intelligence agencies of many countries to identify new methods of (tempest) shielding of electronic equipment. The Israeli research centers (Ben Gurion University) have discovered that the "Air gap" and the old generation shielding systems are not in [...]

read more

(by Ciro Metaggiata) Being able to orient oneself correctly in that enormous “gray area” that cyber-space is becoming is a very complex undertaking. Being able to establish who really is the perpetrator and who the instigator of a cyber attack, especially in the context of judicial investigations, is even more so. However, in the context of the increasingly vast and varied world [...]

read more

US security personnel allegedly paid at least $ 100 to an unidentified Russian who promised compromising material on US President Donald Trump. The investigation was reported in the New York Times, in an article where he explains that it was a scam because the information was "unverified and most likely [...]

read more

One of Japan's largest digital currency exchanges reports it has lost around $ 534 million (£ 380 million) of virtual money in a hacking attack on its network. This is Coincheck where deposits and withdrawals have been suspended for all crypto-currencies except Bitcoin as it has evaluated [...]

read more

Apple, in order not to lose an important slice of the market, has adapted to the new laws and has confirmed that iCloud services in China will be managed by a Chinese company starting next month. For the Cupertino company, this is a necessary decision to act in line with Chinese regulations. Apple contacted [...]

read more

A Californian cybersecurity company has found software that installs a code for the Monero cryptocurrency and sends coins to a server at a North Korean university. If so, it is yet another sign that North Korea could be looking for new ways to revitalize its economy, gripped by the [...]

read more

Researchers have discovered security gaps stemming from central processing units, better known as chips or microchips, which could allow the hacking of data stored on computers and networks. No data breaches have been reported so far. What are the mistakes? There are two separate security flaws known as Meltdown and Specter. Meltdown [...]

read more

Ransomware and malware that will multiply, clouds and critical infrastructures under attack, and a special focus by hackers on mobile devices and the Internet of Things. According to Check Point, these are the issues to be kept under control during 2018. According to analysts of the Israeli company specializing in IT security, ransomware was a hen [...]

read more

(Alessandro Rugolo) One of the businesses of the moment seems to be investing in cryptocurrency. The best known are Bitcoin, Ripple, Ethereum, Litecoin and about 700 other types of digital currency, among the latter there is also one called Youbit, owned by Yapian, a South Korean company. In the last year it seems that the South Koreans have discovered [...]

read more

In my last article: "Artificial Intelligence: opportunity or risk?", I tried to highlight some aspects of what is happening in the field of Artificial Intelligence in the world; this is because, like all news, it has positive aspects but also potentially dangerous aspects AND THEREFORE YOU SHOULD KNOW AND KEEP IN MIND FOR THE FUTURE! Now, for [...]

read more

US-Russia, Moscow interfered in the presidential elections but there is no evidence of Trump's involvement as President and Vice President of the US Senate Intelligence Commission, Republican Richard Burr and Democrat Mark Warner have revealed that the investigations confirm the "interference" Russians in the 2016 presidential elections, but admitted that there is currently no proof [...]

read more

Cyber: Russians succeeded in the impossible, stealing US classified information directly from the NSA Two authoritative American newspapers wrote last Thursday that in 2015 Russian hackers stole US cyber secrets directly from the National Security Agency (NSA) after a employee had put information on their home computer. As previously reported by the Wall [...]

read more

You don't need to be an IT expert to understand the basics of cybersecurity. Even small steps can make a difference in keeping your device and your data safe. All this because cyber crimes, understood as fraud, scams, identity theft and network violations continue to increase, day by day [...]

read more

Leonardo: intelligence, international collaboration and partnership between industry and institutions at the center of the debate at "Cybertech Europe 2017 ″ For two days Rome will once again be the capital of the international debate on cyber security with Leonardo, the main partner of" Cybertech Europe "( http://italy.cybertechconference.com/). The appointment of 26 and 27 September, for the second consecutive year in Italy, [...]

read more

French presidential polls' favorite Emmanuel Macron's campaign had been the target of cyber attacks since January, his party “On the Move” said on Wednesday. In a statement, the centrist movement said a study by security firm Trend Micro showed that a spy group dubbed "Pawn Storm" had targeted Macron's campaign with at least five advanced [...]

read more