Cyber for all - Page 3
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective
AI Act: Cybersecurity requirements for high-risk AI systems
The Artificial Intelligence Act sets out what cybersecurity requirements for high-risk AI systems must be met in the European Union Few regulations have generated more buzz [...]
Read moreVulnerability assessment versus penetration testing. What are the differences?
Vulnerability assessment and penetration testing are compatible exercises that allow for the detection of vulnerabilities in corporate infrastructures and the prioritization of the[...]
Read moreA wave of digital fraud to citizens
Digital frauds to citizens are on the rise, and more sophisticated typologies have emerged to manage to deceive people and scam them «I have something to tell you; add me to Whats[...]
Read moreMalicious mobile apps: Do you know what you install on your smartphone?
Malicious mobile applications allow smartphones to be infected with malware to commit bank fraud or spy on people and companies Photos, videos, documents, messages, applications[...]
Read moreHow can criminals bypass multi-factor authentication (MFA)?
Several types of attacks allow malicious actors to bypass multi-factor authentication and take control of corporate and personal accounts In recent years, software-as-a-service (Sa[...]
Read moreCyber-attacks on the Olympic Games. Bad guys go for the gold at Paris 2024
Cyber-attacks at the Olympic Games pose a threat to organizers, suppliers, involved sectors and even sports fans While broadcasters worldwide were broadcasting the opening ceremony[...]
Read moreCyber-attacks against the defence sector. A new war front
The sophistication and impact of cyber-attacks against the defence sector force organisations to improve their cyber resilience against advanced persistent threats In early 2024, U[...]
Read moreCommon sense and 10 other recommendations to protect your mobile
Update your phone, make backups, set up two-factor authentication, check app permissions, and follow these recommendations to protect your mobile A few weeks ago, we discussed the [...]
Read moreThe QR code scam and quishing: Be careful what you scan!
The QR code scam is used to attack cell phones, spy on companies, commit fraud and obtain access credentials to applications and platforms A British citizen scanned a QR code to pa[...]
Read moreCloud security strategy for enterprises
The massive use of Software as a Service forces companies to have a cloud security strategy for enterprises that allows them to prevent security incidents Enterprise environments h[...]
Read more