
Cyber for all - Page 15
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

The risks of teleworking, is this practice becoming widespread?
Insecure credentials and networks, infected devices, untrained personnel… These are the risks of teleworking, a phenomenon that is here to stay[...]
Read more
IoT and cybersecurity, the next big crisis is knocking on the door
The alliance between IoT and cybersecurity will be indispensable to contain the threats posed by the Web[...]
Read more
From Ramp Tramp to Doom, 6 things you need to know about reverse engineering
Defining the basics of reverse engineering is a challenge that is surely as complex as the practice of the discipline itself[...]
Read more
Dangers of social networks, the trap at home
Security breaches resulting from the dangers of social networks represent a latent risk for organizations[...]
Read more
Pentesting, time of hackers
Pentesting services have become an indispensable weapon for companies in order to protect themselves against cyber attacks[...]
Read more
Pdf converters, playing with fire
Online tools that convert docs or ppts files into pdfs can become a data drain for companies. 77 million of data are sold these days in several black markets for 80.000 euros from [...]
Read more
Ransomware or how to lose the company in a few hours
The ability of cybercriminals to compromise the security and structures of all types of companies is increasingly sophisticated and effective. Cybercrime moves today more than 10 b[...]
Read more