by v.orefice | Mar 8, 2023
How much sensitive information is available in a classic workstation? Actually, much more than you might imagine. Being aware of a few good behavioural practices can help us reduce the risk of our sensitive data or that of our company falling into the hands of...
by m.baciucco | Aug 1, 2022
After another difficult year of restrictions, tough choices and entire days often spent at home in front of the computer, it is hard to resist the call of the summer holidays. So let’s get ready to set off, but remember to pack some useful tips: because cyber...
by m.baciucco | Jul 18, 2022
Il Qishing è una tecnica di attacco basata sulla possibilità che l’ignara vittima inquadri un QR code “malevolo”. Cosa fare per non caderne vittima? La difesa principale resta quella di non scansionare tutto ciò che ci circonda, soprattutto se il codice QR si trova...
by m.baciucco | Feb 14, 2022
Valentine’s Day presents a great opportunity for cyber criminals to make their way into their victims’ wallets instead of their hearts. The goal is to steal personal information, credit card data and personal identities. In what way? With two...
by m.baciucco | Dec 6, 2021
The Internet is the perfect place to shop for Christmas presents, to look for a good bargain or an unusual gift, but it is also the perfect place to organise Christmas holidays. It is also, unfortunately, the ideal place for cyber criminals, who use Christmas as the...