Cyber for all

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Filter by:
Date
Category
Biden gets serious… What if Washington succeeds in changing the cyberattacks map?

Biden gets serious… What if Washington succeeds in changing the cyberattacks map?

USA is starting to offer million-dollar rewards to catch hostile groups. This aggressive response could shift the cyberattacks map to Europe and Asia[...]

Read more
Golang opens the door to full-blown ransomware

Golang opens the door to full-blown ransomware

In recent months, a number of malicious codes developed with Golang have appeared, causing concern in the cybersecurity community[...]

Read more
Digital mules, social engineering continues to do its thing

Digital mules, social engineering continues to do its thing

Frauds that take advantage of social engineering techniques have not stopped growing in recent years and have even accelerated with the pandemic[...]

Read more
The risks of teleworking, is this practice becoming widespread?

The risks of teleworking, is this practice becoming widespread?

Insecure credentials and networks, infected devices, untrained personnel… These are the risks of teleworking, a phenomenon that is here to stay[...]

Read more
IoT and cybersecurity, the next big crisis is knocking on the door

IoT and cybersecurity, the next big crisis is knocking on the door

The alliance between IoT and cybersecurity will be indispensable to contain the threats posed by the Web[...]

Read more
From Ramp Tramp to Doom, 6 things you need to know about reverse engineering

From Ramp Tramp to Doom, 6 things you need to know about reverse engineering

Defining the basics of reverse engineering is a challenge that is surely as complex as the practice of the discipline itself[...]

Read more
Dangers of social networks, the trap at home

Dangers of social networks, the trap at home

Security breaches resulting from the dangers of social networks represent a latent risk for organizations[...]

Read more
The secretary who loved cyberintelligence

The secretary who loved cyberintelligence

Anticipating to competitors, contain data leaks, prevent fraud. Cyberintelligence services applications will be crucial for businesses in digital age A seemingly minor variable. An[...]

Read more
Pentesting, time of hackers

Pentesting, time of hackers

Pentesting services have become an indispensable weapon for companies in order to protect themselves against cyber attacks[...]

Read more
Pdf converters, playing with fire

Pdf converters, playing with fire

Online tools that convert docs or ppts files into pdfs can become a data drain for companies. 77 million of data are sold these days in several black markets for 80.000 euros from [...]

Read more
1 2 3