Sicurezza

Detecting Malware/APT Through Automatic Log Analysis

Pubblicato il

Legacy perimeter security mechanisms can be evaded very easily. It’s disappointing, but it’s true. Innovatively-designed malware and APTs have the potential to evade even the strongest signature-based security solutions that are currently being deployed across industries. This has encouraged IT companies to think beyond prevention and to design effective detection strategies. In recent times, companies […]

Sicurezza

Smart Homes of Tomorrow – This Is Why We Can’t Have Nice Things

Pubblicato il

Privacy, vulnerability and reliability are the three main issues almost every connected device currently on the market faces, yet consumers are still choosing to automate their homes at an incredible rate. Currently we are seeing a huge growth in products and systems designed to improve and transform the way we live our lives inside of […]

Sicurezza

GDPR in Action, Even Facebook Impacted

Pubblicato il

As Europe awaits the General Data Protection Regulation (GDPR) to come into force on May 25th, Facebook is enforcing new terms of service to its users to ensure compliance with the upcoming data privacy law. It will regulate how Facebook collects and uses user data that is critical to the success of its advertisement business. […]

Sicurezza

2017 in Review: Your Favorite Posts

Pubblicato il

Another year has come and gone, full of all sorts of new cyber-attacks and vulnerabilities. Which subjects did our readers find the most fascinating this year? Privacy, open-source tools, and a new botnet threat called Reaper were just a few. Below are the top 10 posts that you kept coming back to: SMB Vulnerabilities – […]

Sicurezza

A Big Change in NSA Spying Marks a Win for American Privacy

Pubblicato il

The charter of the National Security Agency limits its powerful surveillance to the rest of the world, not US citizens. But one controversial carve-out in NSA rules has for years allowed it to vacuum up communications that aren’t “to” or “from” a foreign target, but merely “about” one—no matter who sends or receives it. Now […]

Sicurezza

Uber Didn’t Track Users Who Deleted the App, But It Still Broke the Rules

Pubblicato il

Once again Uber finds itself taking heat for questionable business practices. This time the company was using software to identify iPhones even after their owners deleted the Uber app, or even wiped the phones altogether. That technique, known as fingerprinting, isn’t uncommon—and shouldn’t be interpreted as tracking your every move. But Uber’s implementation crossed a […]