All posts by webmaster@telsy.com

Seminar: “BITCOIN, LA MONETA SENZA AUTORITÀ”.

Seminar: “BITCOIN, LA MONETA SENZA AUTORITÀ”.

The event will take place on 28 of February, at Turin University, in “Aula Buzano”. Following a short abstract: “Bitcoin is a digital currency that operates without any central authority. The key technology behind Bitcoin is the blockchain, a public and distributed register that stores coin exchanges that take place in Bitcoin. The seminar will show how Bitcoin and blockchain work. Some of the myths that have been created around this technology will also be disproved. Lastly, will be presented a research work on the problem of scalability, a problem that prevents Bitcoin from becoming a world-class payment system.”

A Password is not a Pass-Word

A Password is not a Pass-Word

From bank accounts to entertainment, our virtual life is wider than ever, and with the 4th industrial revolution is only meant to grow at an exponential rate. Within this redefined framework, the security of our virtual life will strongly depend on the passwords we choose to protect it. In 2015 the password manager app Dashlane conducted an analysis on their clients revealing that every user owns an average of 90 accounts online. Therefore the amount of data we potentially expose online is massive and the issue of how to protect them must be addressed. The question is: if you were to live in a house with 90 doors facing the […]

Meeting POWERBAND: The APT33 .Net POWERTON variant

Meeting POWERBAND: The APT33 .Net POWERTON variant

// APT 33.Net POWERBAND variant: Introduction Since the Islamic revolution, US and regional rivals have put continuos effort in containing and isolating Iran. Implementing a foreign policy generally addressed as “strategic loneliness”, Iran’s defense strategy has been designed to compensate for the country’s low level of conventional capabilities with its activity in asymmetric warfare, and especially in the cyber domain. Then, let’s meet the APT33.Net POWERTON variant! Indeed, the implementation of the ‘maximum pressure strategy’ by the US has increased the tensions between Washington and Teheran, leading to an all-time low in the history of their relations. The combination of international and economic pressure and of asymmetric warfare is making […]

How well does your car know you?

How well does your car know you?

How well does your car know you? It is certain that our cell phones and electronic devices collect a wide variety of data about us. On top of the new technologies to which we expose our home life (like Alexa or Google Home), our cars can be thought of as smartphones with wheels. Cars are being provided with more software than ever and with built-in navigation systems that memorize where we go (e.g. office, home or favourite café), the frequency with which we go there, how long we stay, and so on. Even car-sharing services have a built-in box that collects data about our driving styles. Granted that gathering information […]

Tamper detection technologies: it takes a thief to catch a thief

Tamper detection technologies: it takes a thief to catch a thief

Tamper detection technlogies are already present in our everyday life, even when we are not aware that they can be called by that name. Tamper detection and tamper evidence methods are already in use in many common situations. They provide proof of unauthorized access to the inner components of a device (i.e. it can void the warranty) or even just of a luxury good in department stores. We speak about tamper evidence when the goal is to reveal the unauthorized access upon examination by a human, and about tamper detection when we implement some sort of automatic action in response to the event. Baseline, tamper evidence and detection methods detect […]

Communication cyber threats landscape

Communication cyber threats landscape

In the new evolving communication landscape, cyber threats do not just target things, objects, or devices. First and foremost, cyberattacks target people and leverage on user’s and programmer’s psychology. On the one side, users are often the practical means by which an attack hits the mark: cybercriminals leverage on the lack of security knowledge and on the speed at which our society moves to infiltrate a system and to damage both network infrastructures and our everyday environment. Sending fraudulent emails, stealing credentials, uploading malicious attachments to applications are just some of the most common ways of exploiting human interactions with technologies to execute an attack. On the other side, even […]

Fighting insecurity and threats with Machine Learning

Fighting insecurity and threats with Machine Learning

Introduction: Machine Learning and Insecurity Machine learning could fight insecurity and cyber threats. The landscape of possible cyberthreats is rapidly changing, exploiting vulnerabilities in new technologies, systematically jeopardizing wide and multifaceted systems, and threatening the security of an ever increasing amount of information. Then, the question follows naturally: how can we secure our infrastructures, systems, and information in this new landscape? Many solutions are already available. Outstanding research programs are already developing and implementing techniques to secure both new technologies, such as new Radio Access Networks and Software Defined Networks, and devices, such as lightweight technologies for IoT devices. But will this be enough? Probably not. Cyberattacks will evolve together […]

Foreseeing what is next: the rise of 5G technologies

Foreseeing what is next: the rise of 5G technologies

Foreseeing 5G technologies as the future of world innovation was right? History teaches us that such predictions were pretty accurate. At the end of the 17th century, the French artist Jean-Marc Côté made some illustrations about en l’an 2000. Already back then, life in the 2000 was pictured as highly automatized: an automatic barber would take care of your skin and a barely self-standing robot would do the housework. But many intuitions that our ancestors would have thought of as barely possible are now features of our pasts. 5G Technologies and Innovation The technological innovation that took place over this past century reaches far beyond these forecasts. Cars will drive […]

The Lazarus’ gaze to the world: What is behind the second stone ?

The Lazarus’ gaze to the world: What is behind the second stone ?

// Introduction In a recent blog post (link here) we analysed the first part of an operation likely conducted by APT38/Lazarus, which targeted various organizations, including financial and banking ones. We already described the initial phase of the kill chain where we get to describe the fact that the actor implemented in the operation two different first-stage payloads to be released to the victims on the basis of their system architecture. These payloads are used in order to carry out a first recognition phase. Beyond this, we have already described a first-level backend script used by the threat actor inside a compromised website to manage victims and to release an […]

Telsy has been involved in the organization of the event ‘’ DE CIFRIS AUGUSTAE TAURINORUM’’, that outlines an overview on cryptanalysis of ARX ciphers.

Telsy has been involved in the organization of the event ‘’ DE CIFRIS AUGUSTAE TAURINORUM’’,  that outlines an overview on cryptanalysis of ARX ciphers.

The event will take place on 22 on November, at Turin University (Aula 2), in ‘’Via Carlo Alberto 10’’ Following, a short abstract: ‘’ We present some features of block ciphers based on the three operations: addition mod 2n, rotation and XOR (ARX ciphers) and themain cryptanalytic attacks obtained by developing the methods underlying differential cryptanalysis. We focus on the recent tecnique of rotational-XOR differential cryptanalysis giving some ideas of this attack and its application to SPECK 32/64.’’

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close