Historical excursus The Digital Services Act (DSA) and the Digital Markets Act (DMA) are two European legislative proposals, and they are two complementary parts of the same project regarding the European digital market. The main goal of the DSA is to provide new obligations and responsibilities for digital intermediaries and online platforms, with a particular focus... Continue Reading →
A BRIEF ANALYSIS OF THE DIGITAL SERVICES PACKAGES DSA&DMA
Google’s abuse of dominant position In 2010 and 2015 three separate antitrust investigations were launched by the European Commission against Google, due to its alleged violation of EU’s competition laws, made possible due to its dominant position in the market. These three cases regarded three different services provided by Google: GoogleAdSense, Google Shopping and the... Continue Reading →
A BRIEF ANALYSIS OF THE DIGITAL SERVICES PACKAGES DSA&DMA
Introduction to the DSA&DMA What is the Digital Package? What are DSA and DMA? Did one day the European Commission, Parliament wake up to the desire to revolutionize the services of the Community digital market? NO. Digital Services Act and the Digital Markets Act are currently just draft regulations with one single scope “ensure that... Continue Reading →
A BRIEF ANALYSIS OF THE DIGITAL SERVICES PACKAGES DSA&DMA
Definition of the digital package’s target The DSA target «The new rules are proportionate, promote innovation, growth and competitiveness and facilitate the expansion of smaller platforms, SMEs and start-ups. The responsibilities of users, platforms and public authorities are rebalanced according to European values, placing citizens at the center. Rules better protect consumers, and their fundamental... Continue Reading →
Why you should adopt a cautious approach to kernel mode anti-cheats
In the last couple of decades, the gaming industry has risen to become one of the top providers of entertainment. Be it in the form of attending e-sports events, watching playthroughs or by directly engaging in gameplay, more and more people are dealing with video games in their free time. With this stark rise in... Continue Reading →
WHAT IS THE “CIA TRIAD”?
Confidentiality, Integrity, and Availability are the main goals to protect the cyberspace. These three are summarized in a single paradigm called the "CIA Triad" and allow the IT expert to give the right priorities to the actions they need to perform while protecting the systems. Each of them is defined as follows: Confidentiality prevents the disclosure... Continue Reading →
5 STEPS OF A CYBER ATTACK
Most cyber attacks follow a common scheme made of the following 5 steps: Let’s go through each of them. 1. Reconnaissance This is the first step of a cyber attack where the attacker collects information about the target; it consists in getting crucial data such as names, credentials, IP addresses, etc. The data are... Continue Reading →
NFT
What do a video of flying cherubs, a burned $95.000 Banksy artwork and digital kittens have in common? A three-letter acronym: NFT. NFT stands for non-fungible-tokens and it’s the latest phenomenon that it’s taking over the Internet. Non-fungible means one-of-a-kind, unique, that cannot be replaced. Some people say that NFT can be considered as “digital... Continue Reading →
Proxy 101
What is a proxy? A proxy is an entity that is located in between the client (you) and the server (the website you want to access) and allows you to safely surf the web. It connects on your behalf to a given website. How does it work? For example, when you want to access a... Continue Reading →
How are developing countries doing in the cybersecurity field?
If we are asked to identify the most advanced countries in the topic of cybersecurity, our minds go straight to industrialized countries. However, among the list of countries with the best cybersecurity, we can surprisingly find many developing countries too. According to the International Monetary Fund (IMF), developing economies are those with a gross national... Continue Reading →