Researchers Demonstrate New Fingerprinting Attack on Tor Encrypted TrafficThe Hacker News
A new analysis of website fingerprinting (WF) attacks aimed at the Tor web browser has revealed that it's possible for an adversary to glean a website frequented by a victim, but only in scenarios where the threat actor is interested...
Neurodiritti e integrità digitale: tutte le sfide della “privacy mentale”Alessandra Lucchini e Salvatore Nucera
Cosa sono i neurodiritti e come tutelare la neural privacy dal rischio che "innovazioni scientifiche potenzialmente preziose per la cura di stati neurodegenerativi divengano lo strumento per fare dell’uomo una non-persona"? Tutte le sfide etiche e giuridiche
L'articolo Neurodiritti e...
North Korean Hackers Target Cybersecurity Researchers with Trojanized IDA ProThe Hacker News
Lazarus, the North Korea-affiliated state-sponsored group, is attempting to once again target security researchers with backdoors and remote access trojans using a trojanized pirated version of the popular IDA Pro reverse engineering software.
The findings were reported by ESET security researcher Anton Cherepanov...
How to Tackle SaaS Security MisconfigurationsThe Hacker News
Whether it's Office 365, Salesforce, Slack, GitHub or Zoom, all SaaS apps include a host of security features designed to protect the business and its data. The job of ensuring these apps' security settings are properly configured falls on the...
Trasparenza e privacy, due diritti in equilibrio: ecco le norme italianeSalvatore Coppola
La richiesta continua di trasparenza dell’azione amministrativa si accompagna alla tutela della privacy. La materia della protezione dei dati personali va coordinata con queste esigenze. Ecco come
L'articolo Trasparenza e privacy, due diritti in equilibrio: ecco le norme italiane proviene...

