by m.baciucco | Jul 28, 2022
Leopards do not change their spots. Never let your guard down After another difficult year of restrictions, bad news, challenging choices, and entire days often spent at home in front of the computer, it’s hard to resist the call of the summer holidays. The...
by m.baciucco | Jul 18, 2022
Il Qishing è una tecnica di attacco basata sulla possibilità che l’ignara vittima inquadri un QR code “malevolo”. Cosa fare per non caderne vittima? La difesa principale resta quella di non scansionare tutto ciò che ci circonda, soprattutto se il codice QR si trova...
by m.baciucco | Jul 18, 2022
It can happen that just when you relax, thinking you are protected from nasty surprises, you are more easily scammed. The confirmation of this elementary principle comes from the results of a study conducted by PhishLabs research laboratories, which tells us that half...
by m.baciucco | Jul 8, 2022
A dimension that fascinates many companies, but also hides many risks There are those who announce an epochal revolution and those who turn their noses up, not wanting to hear arguments. Between the two poles, we find a whole spectrum of different attitudes: from the...
by m.baciucco | Jun 13, 2022
In this pill, we discuss a particularly dangerous cyber technique, spoofing. This scam is making the social engineering activities of cyber criminals increasingly sophisticated. With this technique, a cyber criminal assumes the previously stolen identity of someone we...