Cyber for all - Page 10

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

10 (essential) tips for building a wall of cyber defenses
10 (essential) tips for building a wall of cyber defenses

Tarlogic's Cybersecurity team has drawn up a basic manual for creating a minimum cyber defenses structure: limiting the exposure of services to the Internet, double authentication,[...]

Read more
Yes, hacking cars is going to be one of the problems of this era
Yes, hacking cars is going to be one of the problems of this era

Digitalization is ushering in a new era in the automotive industry, but it has also opened a door to hacking cars[...]

Read more
The stress as adversarial factor for cyber decision-making
The stress as adversarial factor for cyber decision-making

Cyber decision-making is often conditioned by very short response times. High-level research analyzes the impact of stress in these situations[...]

Read more
4 lessons learned from Babuk’s source code
4 lessons learned from Babuk’s source code

Black Arrow Tarlogic's threat hunting team analyzes Babuk's source code to unravel how one of the most active ransomware of 2021 operates[...]

Read more
Biden gets serious… What if Washington succeeds in changing the cyberattacks map?
Biden gets serious… What if Washington succeeds in changing the cyberattacks map?

USA is starting to offer million-dollar rewards to catch hostile groups. This aggressive response could shift the cyberattacks map to Europe and Asia[...]

Read more
Golang opens the door to full-blown ransomware
Golang opens the door to full-blown ransomware

In recent months, a number of malicious codes developed with Golang have appeared, causing concern in the cybersecurity community[...]

Read more
Digital mules, social engineering continues to do its thing
Digital mules, social engineering continues to do its thing

Frauds that take advantage of social engineering techniques have not stopped growing in recent years and have even accelerated with the pandemic[...]

Read more
The risks of teleworking, is this practice becoming widespread?
The risks of teleworking, is this practice becoming widespread?

Insecure credentials and networks, infected devices, untrained personnel… These are the risks of teleworking, a phenomenon that is here to stay[...]

Read more
IoT and cybersecurity, the next big crisis is knocking on the door
IoT and cybersecurity, the next big crisis is knocking on the door

The alliance between IoT and cybersecurity will be indispensable to contain the threats posed by the Web[...]

Read more
From Ramp Tramp to Doom, 6 things you need to know about reverse engineering
From Ramp Tramp to Doom, 6 things you need to know about reverse engineering

Defining the basics of reverse engineering is a challenge that is surely as complex as the practice of the discipline itself[...]

Read more
1 7 8 9 10 11