Steganography, where "steganos" is Greek and stands for "hidden" or "covered," and "graph" stands for "to write", refers to the art and science of communicating in a way that hides the existence of communication. It differs from cryptography as in cryptography, there is visible information that cannot be understood without a key, whereas in steganography,... Continue Reading →
CISCO GUIDELINES TO COUNTERACT PHISHING
Cisco published a guide, made of 5 tips useful to prevent and combat one of the most powerful and dangerous cyber threats: Phishing. The Cisco objective is to raise awareness and alert both people and companies in order to avoid possible attacks, helping to contrast the spread of vulnerabilities exploitable from attackers. Phishing attacks consist... Continue Reading →
How Hackers Can Steal Your Car
On Monday, the European Union Agency for Law Enforcement Cooperation halted a hacking attack which targeted vehicles with keyless entry. The hackers had managed to replace the software of the cars pretending to install an automotive diagnostic solution, and they were thus able to unlock the cars, start the engine and drive away. Europol eventually... Continue Reading →
The psychological consequences of cyberattacks: an IBM study
IBM says that ransomware attacks harm incident responders psychologically. According to a survey conducted by IBM and Morning Consult, hundreds of cybersecurity incident responders indicated ransomware attacks have a significant impact on their mental health. Incident response indicates the activity of immediately identifying an attack lessens its effects, confines the damage, and addresses the root... Continue Reading →
CRYPTOGRAPHY, ENCRYPTION AND ENCODING: LET US TACKLE THE MISUNDERSTANDINGS
Cyber-Taxonomy In order to clarify ideas, we shall start from the formal definition of these three fundamental components of Cybersecurity. The term cryptography came about during the 1650s with the meaning of “art of writing in secret characters” from Modern Latin. Encryption, instead, stands for the process used to convert simple readable data known as... Continue Reading →