Our Blog
Some articles written by the members of our community: the topics could vary from regulations to new technologies, from some new threats to privacy.
How to participate?
You are welcome to participate to our blog, you can contribute at different levels: you could share the articles or make comments to our posts. In case that you are an expert in CyberSecurity you could write us to publish your article.
Cloud Access Security Brokers
Cloud Access Security Brokers: what are they, and why so much people is speaking about them? Know why you too should be interested, their main functionalities and how they can be useful for you
Privacy under attack
Learn about the practices in big data processing and the direct implications on your privacy and digital
identity.
What are the effects on the cyber-security of your personal data and what is at
risk in the future?
Yahoo: a breach's story
The attack started in August 2013, where also passwords and other sensible data were compromised, including the source code of Yahoo that allowed the second attack that allowed to bypass the authentication to the portal.
IoT: The privacy protection in EU
The IoT and the protection of privacy in EU. New development, security requirements every consumer and IoT producer should be aware of: any “Thing”, that never turned off, can potentially become connected.
IoT: The connected things as weapons
1) A robot may not injure a human being or allow a human being to come to harm. 2) A robot must obey the orders given it by human beings except where such orders would conflict with the First Law: could IoT violate Asimov's laws?
UK: a legalized privacy violation
On the 29th of November in Great Britain was approved a new law that extends the online surveillance powers of the government and the police over the citizens. The law obtained the approval of the Queen.
Yahoo: the breach still echos
The vulnerability allowed them to steal confidential information for more than 500 million accounts, but Yahoo disclosure this information to the public only in September 2016, almost 2 years later.
Biometric: The French Big Brother
In France it has been approved a decree that will allow the creation of a huge database with the data of 60 million of French citizens that will collect information from the names to the addresses, from the photos to the fingerprints.
From WhatsApp to Facebook
Why the data shared with Facebook by WhatsApp should be stopped until their usage data will not be clarified. Two American NGO for the privacy protection formally asked the block of the acquisition of WhatsApp by Facebook..
IoT DDoS: The Black Friday of Internet
The DDOS attack that took place on Friday the 21st of October 2016 could be considered the 11th of September of Internet. Without the necessary countermeasures, such attacks are destiny to be repeated.