I più popolari

L'awareness a fumetti

2 Mar

Revenge porn, contenuti subito via dal web: ecco le nuove (efficaci) tuteleMassimo Borgobello

Il Garante privacy ha inserito nel proprio regolamento l’articolo 33 bis, per regolare la procedura online di segnalazione. La normativa appare così più efficace e potrà dare un impulso risolutivo alla problematica, affrontata per anni in modo frammentario e senza...

By

,

Commenti disabilitati su Revenge porn, contenuti subito via dal web: ecco le nuove (efficaci) tuteleMassimo Borgobello Read More
2 Mar

LIVE Webinar: Key Lessons Learned from Major Cyberattacks in 2021 and What to Expect in 2022The Hacker News

With the COVID-19 pandemic continuing to impact, and perhaps permanently changing, how we work, cybercriminals again leveraged the distraction in new waves of cyberattacks. Over the course of 2021 we saw an increase in multiple attack approaches; some old, some new....

By

,

Commenti disabilitati su LIVE Webinar: Key Lessons Learned from Major Cyberattacks in 2021 and What to Expect in 2022The Hacker News Read More
2 Mar

Hackers Begin Weaponizing TCP Middlebox Reflection for Amplified DDoS AttacksThe Hacker News

Distributed denial-of-service (DDoS) attacks leveraging a new amplification technique called TCP Middlebox Reflection have been detected for the first time in the wild, six months after the novel attack mechanism was presented in theory. "The attack […] abuses vulnerable firewalls and...

By

,

Commenti disabilitati su Hackers Begin Weaponizing TCP Middlebox Reflection for Amplified DDoS AttacksThe Hacker News Read More
2 Mar

Dati personali: i pericoli più comuni della rete e come evitarliFlavia Fornasiero

Dalla mancanza di trasparenza sul trattamento ai cookie, dal nudging al phishing: ecco tutte le trappole che potrebbero mettere in pericolo i nostri dati nel corso delle nostre quotidiane attività online. Cosa sapere, i rischi e come proteggersi L'articolo Dati...

By

,

Commenti disabilitati su Dati personali: i pericoli più comuni della rete e come evitarliFlavia Fornasiero Read More
2 Mar

Critical Bugs Reported in Popular Open Source PJSIP SIP and Media StackThe Hacker News

As many as five security vulnerabilities have been disclosed in the PJSIP open-source multimedia communication library that could be abused by an attacker to trigger arbitrary code execution and denial-of-service (DoS) in applications that use the protocol stack. The weaknesses were identified...

By

,

Commenti disabilitati su Critical Bugs Reported in Popular Open Source PJSIP SIP and Media StackThe Hacker News Read More
2 Mar

TeaBot Android Banking Malware Spreads Again Through Google Play Store AppsThe Hacker News

An Android banking trojan designed to steal credentials and SMS messages has been observed sneaking past Google Play Store protections to target users of more than 400 banking and financial apps from Russia, China, and the U.S. "TeaBot RAT capabilities are...

By

,

Commenti disabilitati su TeaBot Android Banking Malware Spreads Again Through Google Play Store AppsThe Hacker News Read More
2 Mar

Critical Security Bugs Uncovered in VoIPmonitor Monitoring SoftwareThe Hacker News

Critical security vulnerabilities have been uncovered in VoIPmonitor software that, if successfully exploited, could allow unauthenticated attackers to escalate privileges to the administrator level and execute arbitrary commands. Following responsible disclosure by researchers from Kerbit, an Ethiopia-based penetration-testing and vulnerability research firm,...

By

,

Commenti disabilitati su Critical Security Bugs Uncovered in VoIPmonitor Monitoring SoftwareThe Hacker News Read More