The Mathematics behind PQC: Multivariate Polynomials
BEC and CEO fraud: a growing risk for companies
A virus has been circulating since last year: it’s called HEH and it can infect practically everything: from routers to IoT devices. This new threat that is spreading on the...
Penetration Testing (Pen Test) refers to the activity of systematically attempting to violate a vulnerable component of a system to discover the security breaches in it through a simulated attack....
Anonymous is the most famous hacktivist group in the world. It gained international attention when it attacked the Church of Scientology’s website in 2008. As an informal group without a...
Kevin Mitnick was the most elusive computer break-in artist in history. Security experts often refer to him as “The World’s Most Wanted Hacker.” Indeed, the US Feds took almost three...
You will take a hacker seriously after reading the story of Raphael Grey. Raphael Grey managed to hack several e-commerce sites, accessing the customers’ credit card data for a month...
Cyber risks, as we know, have always been around the corner. They are insidious and can even silently affect the data of companies and individuals quite easily, if not adequately...
It was a 17-year-old hacker who managed to persuade some Twitter employees that he was a collaborator of the technology department who needed the credentials to log into the customer...
In recent weeks the Campari group has suffered a serious ransomware attack of the so-called “double extortion” technique. The damage would amount to two terabytes of stolen data, with attached...
The enemies of the future will not necessarily need bombs, missiles or atomic weapons to instil terror in civilian populations. They will need only some tape, scissors and good practical...