by v.orefice | Mar 8, 2023
How much sensitive information is available in a classic workstation? Actually, much more than you might imagine. Being aware of a few good behavioural practices can help us reduce the risk of our sensitive data or that of our company falling into the hands of...
by m.baciucco | Aug 1, 2022
After another difficult year of restrictions, tough choices and entire days often spent at home in front of the computer, it is hard to resist the call of the summer holidays. So let’s get ready to set off, but remember to pack some useful tips: because cyber...
by m.baciucco | Jul 18, 2022
Il Qishing è una tecnica di attacco basata sulla possibilità che l’ignara vittima inquadri un QR code “malevolo”. Cosa fare per non caderne vittima? La difesa principale resta quella di non scansionare tutto ciò che ci circonda, soprattutto se il codice QR si trova...
by m.baciucco | Feb 14, 2022
Valentine’s Day presents a great opportunity for cyber criminals to make their way into their victims’ wallets instead of their hearts. The goal is to steal personal information, credit card data and personal identities. In what way? With two...
by m.baciucco | Jan 10, 2022
Has the SIM card in your Smartphone stopped working? It may be that you are the victim of a computer scam. The SIM Swap is actually a different scam from all the others, because it manifests itself with the appearance of a problem with the telephone line....