Monthly Archives: May 2020

How Artificial Intelligence and Machine Learning will change the world of cybersecurity

How Artificial Intelligence and Machine Learning will change the world of cybersecurity

Artificial Intelligence (AI) and Machine Learning (ML) tools could substantially help in the fight against cybercrime. But even these technologies can’t guarantee absolute security, and they could even be exploited by malicious hackers. Here we will consider some of the implications about the use of these new instruments in the cybersecurity sector. In 2020 cyber criminals pose a growing threat to all kinds of organisations and companies, as well as their customers. Businesses are doing their best to defend themselves, but it’s hard to predict what new types of cyberattacks will emerge and how they’ll work, which cyber criminals tend use in their favour. Artificial Intelligence and Machine Learning can […]

Simjacker and other cyber threats for mobile devices in 2020

Simjacker and other cyber threats for mobile devices in 2020

At the end of last year, a security company discovered a serious threat to the world of cell phones and beyond: Simjacker, an attack technique that allows, in fact, to take control of a mobile phone by simply sending an SMS. Given the always increasing use of smartphones, it’s easy to understand the great dangerousness of this type of attack. Here we will see some details about this and other cyber threats for mobile devices that have recently emerged. Simjacker, the first case of Malware-SMS The Simjacker technique is particularly dangerous because it can be successfully exploited against a large variety of connected devices: not only mobile phones and smartphones, […]

The revolutionary methods to attack air-gapped devices

The revolutionary methods to attack air-gapped devices

In the last few years, the Cyber-Security Research Center of Israel’s Ben Gurion University of the Negev coordinated by Dr. Mordechai Guri, has developed and tested several new types of malware that allow to covertly steal highly sensitive data from air-gapped and audio-gapped systems. Here we will briefly analyse some of the most surprising techniques that they have successfully tested.      What air-gapped systems are and the difficulty of hacking them The term “air-gapping” indicates a network security measure employed on one or more computers to ensure that a certain computer system is physically isolated from unsecured networks, such as the public Internet or an unsafe local area network. Air-gapped […]

Telsy partecipa all’Open Innovation challenge della Regione Lazio

Telsy partecipa all’Open Innovation challenge della Regione Lazio

Lo scorso 29 aprile Telsy ha lanciato, in collaborazione con la Regione Lazio e Lazio Innova, la challenge “Autenticazione innovativa per dispositivi mobili”. L’obiettivo della sfida è quello di promuovere la progettazione e lo sviluppo di metodi e tecnologie innovative per l’autenticazione su dispositivi mobili. Ai gruppi partecipanti viene richiesto in particolare di sviluppare un sistema di autenticazione realmente affidabile e sicuro, capace di proteggere efficacemente gli smartphone del futuro.  In particolare la challenge è rivolta a: startup e PMI innovative registrate nelle apposite sezioni del Registro delle impresemicroimprese, startup e PMIteam informali composti da almeno tre personespin off universitari e di centri di ricerca. Le iscrizioni sono aperte e […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close