I più popolari
Post Recenti
Garante Protezione dei Dati Personali
L'awareness a fumetti
Penetration Testing Your AWS Environment - A CTO's GuideThe Hacker News
So, you've been thinking about getting a Penetration Test done on your Amazon Web Services (AWS) environment. Great! What should that involve exactly?
There are many options available, and knowing what you need will help you make your often limited security...
New U.S. Government Initiative Holds Contractors Accountable for CybersecurityThe Hacker News
The U.S. government on Wednesday announced the formation of a new Civil Cyber-Fraud Initiative that aims to hold contractors accountable for failing to meet required cybersecurity requirements in order to safeguard public sector information and infrastructure.
"For too long, companies have...
Apple now requires all apps to make it easy for users to delete their accountsThe Hacker News
All third-party iOS, iPadOS, and macOS apps that allow users to create an account should also provide a method for terminating their accounts from within the apps beginning next year, Apple said on Wednesday.
"This requirement applies to all app submissions...
L’accesso all’email del coniuge non sempre è reato. I paletti della Corte di StrasburgoMicol Sabatini e Rossella Bucca
La Corte di Strasburgo, ha ritenuto che non sia stato violato il diritto alla riservatezza, tutelato dall’art. 8 CEDU, da parte di un uomo in seguito alla denuncia della moglie avente a oggetto l’introduzione abusiva nella propria casella di posta...
Cybersecurity, attenzione ai personal computer condivisi tra lavoro e tempo libero
In un recente sondaggio, YouGov – società che si occupa di indagini di mercato a livello globale – ha chiesto a 8.443 impiegati e a 1.100 decision maker nell'ambito...
Read MoreIl Sole 24 ORE - Tecnologia
Iranian Hackers Abuse Dropbox in Cyberattacks Against Aerospace and Telecom FirmsThe Hacker News
Details have emerged about a new cyber espionage campaign directed against the aerospace and telecommunications industries, primarily in the Middle East, with the goal of stealing sensitive information about critical assets, organizations' infrastructure, and technology while remaining in the dark...
Twitch, online il codice sorgente e i ricavi degli streamer. In corso le verifiche
Si tratta di un torrent di 126 GB, caricato su 4chan. Sono in corso le verifiche degli esperti.Read MoreIl Sole 24 ORE - Tecnologia










