Tag Archives: Cybersecurity

Phishing: how to detect one of the subtlest online threats

Phishing: how to detect one of the subtlest online threats

Phishing is one the subtlest threats in the dark world of cyber threats. The world has been witnessing a surge in phishing attacks since the outbreak of the pandemic. It may be extremely disruptive and carry big security problems, but there are several ways to mitigate this threat. With a caveat: enhancing your cybersecurity through software  is essential, but it is not a silver bullet. Indeed, much depends on users’ behavior and threat actors know that. Let’s explore how, then! How to avoid phishing: identifying threats Scammers have increased their sophistication to induce victims into trap. Phishing emails and text messages may look like they’re from a company you know […]

Cyberwarfare and national economies

Cyberwarfare and national economies

In the dark woods of cyber threats, cyberwarfare is not just as standard threat. It is much more serious than that. It is no secret that big and key strategic businesses are the targets of very sophisticated cyber threats. Many of them are, not surprisingly, state-sponsored. Indeed, such businesses lie at the crosshairs of governments, national intelligence agencies, and even terroristic groups. In this piece, we aim to investigate what are effects of cyberwarfare on national economies and how nations could protect themselves. Cyberwarfare: what is it? First, let’s define what cyberwarfare is. Cyberwarfare refers to those activities carried out by a nation-state or international organizations meant to damage the […]

The revolutionary methods to attack air-gapped devices

The revolutionary methods to attack air-gapped devices

In the last few years, the Cyber-Security Research Center of Israel’s Ben Gurion University of the Negev coordinated by Dr. Mordechai Guri, has developed and tested several new types of malware that allow to covertly steal highly sensitive data from air-gapped and audio-gapped systems. Here we will briefly analyse some of the most surprising techniques that they have successfully tested.      What air-gapped systems are and the difficulty of hacking them The term “air-gapping” indicates a network security measure employed on one or more computers to ensure that a certain computer system is physically isolated from unsecured networks, such as the public Internet or an unsafe local area network. Air-gapped […]

A new campaign of phishing attacks to steal personal data reported

A new campaign of phishing attacks to steal personal data reported

A few days ago, on the 27th of March, industry reporting signalled a new campaign of Covid-19/ coronavirus-themed spear phishing attacks that illegitimately uses the WHO (World Health Organization) mark, to spread another variant of the info-stealer Lokibot, in order to steal personal data and confidential information from the victims of the attack. This is not the first time that this particular malware has appeared, in fact numerous versions, all derived from the original source code, have already been identified. The most disparate methods were also used for what concerns the means of distribution. This spear phishing campaign has already spread rapidly in different parts of the world, especially in […]

A Password is not a Pass-Word

A Password is not a Pass-Word

From bank accounts to entertainment, our virtual life is wider than ever, and with the 4th industrial revolution is only meant to grow at an exponential rate. Within this redefined framework, the security of our virtual life will strongly depend on the passwords we choose to protect it. In 2015 the password manager app Dashlane conducted an analysis on their clients revealing that every user owns an average of 90 accounts online. Therefore the amount of data we potentially expose online is massive and the issue of how to protect them must be addressed. The question is: if you were to live in a house with 90 doors facing the […]

DDOS and botnet attacks: the deadly link

DDOS and botnet attacks: the deadly link

What’s the link between zero-day and DDOS botnet attacks? The growing demand for connectivity and faster data transfer, along with new technology trends such as the Internet of Things (IoT) and the Artificial Intelligence (AI), combined withthe progressive implementation of the 5G network, are going to irreversibly reshape the pre-existing structure of cybersecurity at a global level. It is true that 5G network will bring new services, new capabilities, new technologies and new regulatory requirements, but it will also bring new security threats and an increased attack surface. With IoT inception many and different actors and devices with different security standards will become involved in the transition, requiring superior attack […]

Telsy’s Engineer Andrea Molino spoke at the National Cryptography Association

Telsy’s Engineer Andrea Molino spoke at the National Cryptography Association

Telsy is proud to cooperate with the National Cryptography Association. On 14 October 2019, a member of our team, Eng. Andrea Molino, gave a speech at the event ”La De Cifris incontra Torino”, organized by De Componendis Cifris, or National Cryptography Association,and held at Politecnico in Turin. The event focused on successful advancements in cryptography research and applications. The initiative involved several experts from academic institutions and business operating in the cryptography sector. The main goal was fostering cooperation between those who work in the Italian crypto domain. The contribution given by Andrea, finally, dealt with implementation aspects of cryptography. He underlined: “security architecture and schemes cannot ignore hardware systems […]

Cybersecurity & Cyberattacks: a Hand-In-Hand Development Through The Years

Cybersecurity & Cyberattacks: a Hand-In-Hand Development Through The Years

Cybersecurity & Cyberattacks are concepts that developped hand-in-hand. Let’s discover how! Cybersecurity & Cyberattacks: the birth of Internet The birth of the internet and the digital era brought to the light the theme of “cybersecurity”, that over the past years gained more and more importance. Security, indeed, has always been a challenge for IT people and corporate organizations alike since the launching of the first internet network, ARPAnet. During the seventies, the first viruses appeared in this web, that was developed for military purposes and that later on  became a universal  tool. Robert Thomas was the engineer who developed the first malware called “creeper”. He realized that it was possible […]

Seminar – “An introduction to secure multi – party computation”

Seminar – “An introduction to secure multi – party computation”

Telsy seminar of Giuseppe D’Alconzo entitled : ‘’ An introduction to secure multi – party computation’’ The seminar, organized with The Polytechnic University of Turin, will be held on Monday 15 July at 14.30 PM in Polytechnic’s Aula Buzano – Dipartimento di Scienze Matematiche Abstract: Secure Multi Party Computation (MPC) is a branch of cryptography that allows a set of players to evaluate a public function on private inputs, revealing no information about them apart from the computed output. It is an alternative to the strong assumption of the existence of a trusted party. It was born in the 1980s as a theoretical and not so treatable field for its computational […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close