by m.baciucco | Jul 18, 2022
Il Qishing è una tecnica di attacco basata sulla possibilità che l’ignara vittima inquadri un QR code “malevolo”. Cosa fare per non caderne vittima? La difesa principale resta quella di non scansionare tutto ciò che ci circonda, soprattutto se il codice QR si trova...
by m.baciucco | Jul 18, 2022
It can happen that just when you relax, thinking you are protected from nasty surprises, you are more easily scammed. The confirmation of this elementary principle comes from the results of a study conducted by PhishLabs research laboratories, which tells us that half...
by m.baciucco | Jul 8, 2022
A dimension that fascinates many companies, but also hides many risks There are those who announce an epochal revolution and those who turn their noses up, not wanting to hear arguments. Between the two poles, we find a whole spectrum of different attitudes: from the...
by m.baciucco | Jun 13, 2022
In this pill, we discuss a particularly dangerous cyber technique, spoofing. This scam is making the social engineering activities of cyber criminals increasingly sophisticated. With this technique, a cyber criminal assumes the previously stolen identity of someone we...
by m.baciucco | Jun 13, 2022
In this pill we have addressed, in a storytelling format, one of the most popular and dangerous malware of recent times: Ransomware. Known as the ransom malware, it has become sadly famous for the many organizations that have been its victims in recent times. This...