PIVA/VAT IT 10539491000 | Via Benedetto Croce, 97 Roma (RM), Italy


Ford, Toyota, GM and Tesla among car companies impacted by leaky backup service used by third-party firm.

An insecure backup protocol used by robotics firm Level One is to blame for leaking 157 gigabytes of sensitive data belonging major automakers, including Ford, Tesl...

Yet another bluetooth hacking technique has been uncovered.

A highly critical cryptographic vulnerability has been found affecting some Bluetooth implementations that could allow an unauthenticated, remote attacker in physical proximity of targeted devices to intercept,...

In the past year or so, I’ve been looking at all sorts of technology related to cybersecurity. Compared to most domains of IT, cybersecurity is a jungle of overlapping offerings. It is not easy to understand each product or how many products one might need.

To help sort...

The patterns of cyber attacks are well known and so are the targets. The bad guys are seeking to break in to get valuable data or take actions that benefit them, and want to go undetected for as long as possible. There are a number of solutions out there dedicated to p...

Please reload

Featured Posts

In A Meltdown And Spectre World Is Digital Privacy Truly Dead?

January 10, 2018

Please reload

Recent Posts
Please reload

Please reload

Search By Tags