15 Nov

Researchers Demonstrate New Fingerprinting Attack on Tor Encrypted TrafficThe Hacker News

A new analysis of website fingerprinting (WF) attacks aimed at the Tor web browser has revealed that it's possible for an adversary to glean a website frequented by a victim, but only in scenarios where the threat actor is interested...

By

,

Commenti disabilitati su Researchers Demonstrate New Fingerprinting Attack on Tor Encrypted TrafficThe Hacker News Read More
15 Nov

Neurodiritti e integrità digitale: tutte le sfide della “privacy mentale”Alessandra Lucchini e Salvatore Nucera

Cosa sono i neurodiritti e come tutelare la neural privacy dal rischio che "innovazioni scientifiche potenzialmente preziose per la cura di stati neurodegenerativi divengano lo strumento per fare dell’uomo una non-persona"? Tutte le sfide etiche e giuridiche L'articolo Neurodiritti e...

By

,

Commenti disabilitati su Neurodiritti e integrità digitale: tutte le sfide della “privacy mentale”Alessandra Lucchini e Salvatore Nucera Read More
15 Nov

North Korean Hackers Target Cybersecurity Researchers with Trojanized IDA ProThe Hacker News

Lazarus, the North Korea-affiliated state-sponsored group, is attempting to once again target security researchers with backdoors and remote access trojans using a trojanized pirated version of the popular IDA Pro reverse engineering software. The findings were reported by ESET security researcher Anton Cherepanov...

By

,

Commenti disabilitati su North Korean Hackers Target Cybersecurity Researchers with Trojanized IDA ProThe Hacker News Read More
15 Nov

How to Tackle SaaS Security MisconfigurationsThe Hacker News

Whether it's Office 365, Salesforce, Slack, GitHub or Zoom, all SaaS apps include a host of security features designed to protect the business and its data. The job of ensuring these apps' security settings are properly configured falls on the...

By

,

Commenti disabilitati su How to Tackle SaaS Security MisconfigurationsThe Hacker News Read More
15 Nov

Trasparenza e privacy, due diritti in equilibrio: ecco le norme italianeSalvatore Coppola

La richiesta continua di trasparenza dell’azione amministrativa si accompagna alla tutela della privacy. La materia della protezione dei dati personali va coordinata con queste esigenze. Ecco come L'articolo Trasparenza e privacy, due diritti in equilibrio: ecco le norme italiane proviene...

By

,

Commenti disabilitati su Trasparenza e privacy, due diritti in equilibrio: ecco le norme italianeSalvatore Coppola Read More