Tag: cybersecurity
DL Aiuti, AIIP: “insufficient measures” for cybersecurity
(Finance) – AIIP – Italian Internet Provider Association expresses satisfaction for the approval, within the “DL Aiuti” of a standard, Article 37, which deals with the issue of the reaction…
The ultimate technique to detect deepfakes
Faced with the proliferation of real-time deepfakes, a company has determined two simple methods to find out if your interlocutor is really who he claims to be. Simply ask him…
Think like hackers to strengthen security
In order to develop defense mechanisms, MIT researchers studied the weak point of Intel Xeon and Intel Core X server processors. They discovered how to attack the component that manages…
The ultimate technique to spot a deepfake
Faced with the proliferation of real-time deepfakes, a company has determined two simple methods to find out if your interlocutor is really who he claims to be. Simply ask him…
Researchers Announce ‘Revolutionary Scientific Advancement’ in Molecular Data Storage and Cryptography
Scientists at the University of Texas have succeeded in transmitting an encryption key in a single letter. Through the use of polymers, they were able to hide the data directly…
Hackers stole private data from 5.4 million Twitter accounts
Using a vulnerability, a hacker stole the username, phone number and email address used by the accounts of 5.4 million Twitter users. He tried to sell this database on a…
A network of 11,000 fake investment sites
A massive network of interconnected fake investment sites has been uncovered. Composed of more than 11,000 domains, it specifically targets Europe and usurps the identity of well-known personalities to better…
Android: more than 30 infected apps to uninstall urgently!
Around ten million Android users have installed at least one app that includes malware. In total, there are currently around thirty infected applications and the damage ranges from the display…
A new cyber espionage case hits Europe
You will also be interested [EN VIDÉO] Cyber espionage: what are the threats? Interference in elections, theft of industrial data, hacking into military systems… Cyber espionage has taken off in…
Microsoft has found a way to limit ransomware
You will also be interested [EN VIDÉO] Kézako: how is data encrypted on the Internet? Cryptography is the oldest form of encryption. There are traces of its use until 2,000…