NEWS Millions of people around the world use Dropbox to store their files in a secure location on the cloud. On November 1st however, the security of the file hosting software became compromised after hackers successfully pulled off a series of phishing attacks on Dropbox employees granting them access into Dropbox’s system. The company revealed... Continue Reading →
TRENITALIA CYBER-ATTACK, MARCH 2022
On the morning of March 23rd, all the Trenitalia and RFI ticket offices and self-service machines were found to be unusable, causing inconvenience to thousands of people who rely on them every day to buy their train tickets. The cause of these inefficiencies is the same that interrupted the information services of the Lazio Region... Continue Reading →
SOCIAL ENGINEERING – EXPLOITING PSICHOLOGY IN THE NEW ERA OF CYBER-ATTACKS
Work smarter not harder. Even hackers nowadays are relying on this long-lived saying when it comes to gathering confidential information or gaining unauthorized access to a device, to name a few. As a matter of fact, malicious actors are well aware of the fact that it’s much easier to manipulate and persuade people into giving... Continue Reading →
A BRIEF ANALYSIS OF THE DIGITAL SERVICES PACKAGES DSA&DMA
Historical excursus The Digital Services Act (DSA) and the Digital Markets Act (DMA) are two European legislative proposals, and they are two complementary parts of the same project regarding the European digital market. The main goal of the DSA is to provide new obligations and responsibilities for digital intermediaries and online platforms, with a particular focus... Continue Reading →
A BRIEF ANALYSIS OF THE DIGITAL SERVICES PACKAGES DSA&DMA
Google’s abuse of dominant position In 2010 and 2015 three separate antitrust investigations were launched by the European Commission against Google, due to its alleged violation of EU’s competition laws, made possible due to its dominant position in the market. These three cases regarded three different services provided by Google: GoogleAdSense, Google Shopping and the... Continue Reading →
A BRIEF ANALYSIS OF THE DIGITAL SERVICES PACKAGES DSA&DMA
Introduction to the DSA&DMA What is the Digital Package? What are DSA and DMA? Did one day the European Commission, Parliament wake up to the desire to revolutionize the services of the Community digital market? NO. Digital Services Act and the Digital Markets Act are currently just draft regulations with one single scope “ensure that... Continue Reading →
A BRIEF ANALYSIS OF THE DIGITAL SERVICES PACKAGES DSA&DMA
Definition of the digital package’s target The DSA target «The new rules are proportionate, promote innovation, growth and competitiveness and facilitate the expansion of smaller platforms, SMEs and start-ups. The responsibilities of users, platforms and public authorities are rebalanced according to European values, placing citizens at the center. Rules better protect consumers, and their fundamental... Continue Reading →
Why you should adopt a cautious approach to kernel mode anti-cheats
In the last couple of decades, the gaming industry has risen to become one of the top providers of entertainment. Be it in the form of attending e-sports events, watching playthroughs or by directly engaging in gameplay, more and more people are dealing with video games in their free time. With this stark rise in... Continue Reading →
WHAT IS THE “CIA TRIAD”?
Confidentiality, Integrity, and Availability are the main goals to protect the cyberspace. These three are summarized in a single paradigm called the "CIA Triad" and allow the IT expert to give the right priorities to the actions they need to perform while protecting the systems. Each of them is defined as follows: Confidentiality prevents the disclosure... Continue Reading →
5 STEPS OF A CYBER ATTACK
Most cyber attacks follow a common scheme made of the following 5 steps: Let’s go through each of them. 1. Reconnaissance This is the first step of a cyber attack where the attacker collects information about the target; it consists in getting crucial data such as names, credentials, IP addresses, etc. The data are... Continue Reading →