Edoardo Signorini is an undergraduate student who is currently working on various projects in Telsy, while writing his thesis about the “Post Quantum Cryptography”. Furthermore, he also published his work together with two professors of the Polytechnic of Turin, Carlo Sanna and Antonio Jose’ Di Scala, as a part of the amazing job that he is doing within the Company. Following the abstract: Recently, Blanco-Chac´on proved the equivalence between the Ring Learning With Errors and Polynomial Learning With Errors problems for some families of cyclotomic number fields by giving some upper bounds for the condition number Cond(Vn) of the Vandermonde matrix Vn associated to the nth cyclotomic polynomial. We prove […]
On March 6th at 11 am our Head of CTI Division, Emanuele de Lucia, and our CTI Analyst, Marco di Costanzo, will hold a webinar entitled ”Iranian Cyber Capabilities”.This webinar will focus on recent moves on Iran in Cyber Threat Landscape. To apply for participation leave a comment on our blog specifying Company and Corporate email to which further details will be sent (No comment will be shown on the blog).
The event will take place on 28 of February, at Turin University, in “Aula Buzano”. Following a short abstract: “Bitcoin is a digital currency that operates without any central authority. The key technology behind Bitcoin is the blockchain, a public and distributed register that stores coin exchanges that take place in Bitcoin. The seminar will show how Bitcoin and blockchain work. Some of the myths that have been created around this technology will also be disproved. Lastly, will be presented a research work on the problem of scalability, a problem that prevents Bitcoin from becoming a world-class payment system.”
From bank accounts to entertainment, our virtual life is wider than ever, and with the 4th industrial revolution is only meant to grow at an exponential rate. Within this redefined framework, the security of our virtual life will strongly depend on the passwords we choose to protect it. In 2015 the password manager app Dashlane conducted an analysis on their clients revealing that every user owns an average of 90 accounts online. Therefore the amount of data we potentially expose online is massive and the issue of how to protect them must be addressed. The question is: if you were to live in a house with 90 doors facing the […]
// APT 33.Net POWERBAND variant: Introduction Since the Islamic revolution, US and regional rivals have put continuos effort in containing and isolating Iran. Implementing a foreign policy generally addressed as “strategic loneliness”, Iran’s defense strategy has been designed to compensate for the country’s low level of conventional capabilities with its activity in asymmetric warfare, and especially in the cyber domain. Then, let’s meet the APT33.Net POWERTON variant! Indeed, the implementation of the ‘maximum pressure strategy’ by the US has increased the tensions between Washington and Teheran, leading to an all-time low in the history of their relations. The combination of international and economic pressure and of asymmetric warfare is making […]