I più popolari
Post Recenti
L'awareness a fumetti
Google Drops FLoC and Introduces Topics API to Replace Tracking Cookies for AdsThe Hacker News
Google on Tuesday announced that it is abandoning its controversial plans for replacing third-party cookies in favor of a new Privacy Sandbox proposal called Topics, which categorizes users' browsing habits into approximately 350 topics.
Thee new framework, which takes the place of FLoC (short for Federated...
12-Year-Old Polkit Flaw Lets Unprivileged Linux Users Gain Root AccessThe Hacker News
A 12-year-old security vulnerability has been disclosed in a system utility called Polkit that grants attackers root privileges on Linux systems, even as a proof-of-concept (PoC) exploit has emerged in the wild merely hours after technical details of the bug...
Google localizza gli utenti con l’inganno: uso distorto delle norme privacyFranco Pizzetti
I procuratori generali di vari stati negli USA accusano Google di carpire la posizione degli utenti con dark pattern. Lezione anche per l'Europa: è ora di affrontare il caso di usi “fraudolenti” del GDPR, specie quando consistenti nell’applicarlo in modo...
Hackers Exploited MSHTML Flaw to Spy on Government and Defense TargetsThe Hacker News
Cybersecurity researchers on Tuesday took the wraps off a multi-stage espionage campaign targeting high-ranking government officials overseeing national security policy and individuals in the defense industry in Western Asia.
The attack is unique as it leverages Microsoft OneDrive as a command-and-control...
TrickBot Malware Using New Techniques to Evade Web Injection AttacksThe Hacker News
The cybercrime operators behind the notorious TrickBot malware have once again upped the ante by fine-tuning its techniques by adding multiple layers of defense to slip past antimalware products.
"As part of that escalation, malware injections have been fitted with added...
Hackers Infect macOS with New DazzleSpy Backdoor in Watering-Hole AttacksThe Hacker News
A previously undocumented cyber-espionage malware aimed at Apple's macOS operating system leveraged a Safari web browser exploit as part of a watering hole attack targeting politically active, pro-democracy individuals in Hong Kong.
Slovak cybersecurity firm ESET attributed the intrusion to an actor with...
Software libero, la PA non ha più scuse: linee guida e indicazioni per non sbagliareFlavia Marzano
Tutta la Pubblica Amministrazione italiana, locale e centrale, deve al più presto definire i propri Piani triennali per l’ICT includendo anche i propri progetti di transizione al software libero. Le linee guida su come scegliere, adottare e riusare software e...








