Can you be hacked through a picture? Image Steganography

Steganography, where "steganos" is Greek and stands for "hidden" or "covered," and "graph" stands for "to write", refers to the art and science of communicating in a way that hides the existence of communication. It differs from cryptography as in cryptography, there is visible information that cannot be understood without a key, whereas in steganography,... Continue Reading →

CISCO GUIDELINES TO COUNTERACT PHISHING

Cisco published a guide, made of 5 tips useful to prevent and combat one of the most powerful and dangerous cyber threats: Phishing.  The Cisco objective is to raise awareness and alert both people and companies in order to avoid possible attacks, helping to contrast the spread of vulnerabilities exploitable from attackers. Phishing attacks consist... Continue Reading →

How Hackers Can Steal Your Car 

On Monday, the European Union Agency for Law Enforcement Cooperation halted a hacking attack which targeted vehicles with keyless entry. The hackers had managed to replace the software of the cars pretending to install an automotive diagnostic solution, and they were thus able to unlock the cars, start the engine and drive away. Europol eventually... Continue Reading →

The psychological consequences of cyberattacks: an IBM study

IBM says that ransomware attacks harm incident responders psychologically.  According to a survey conducted by IBM and Morning Consult, hundreds of cybersecurity incident responders indicated ransomware attacks have a significant impact on their mental health. Incident response indicates the activity of immediately identifying an attack lessens its effects, confines the damage, and addresses the root... Continue Reading →

Create a website or blog at WordPress.com

Up ↑