Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Autore: enrico

  1. Home
  2. Author Archives: enrico

In Apple vs FBI Case, Compromise Appears Elusive

read more

Continue reading

Romanian Hacker “Guccifer” to be Extradited to U.S.

Romanian Court Approves Extradition of Hacker "Guccifer" to United States
Marcel Lazar Lehel, the 42-year-old Romanian national known as “Guccifer” and accused of breaching the online accounts of several public figures, will be extradited to the United States.
read more

Continue reading

Flaw in Fortinet Login Page Allowed Attackers to Phish Credentials

A reflected cross-site scripting (XSS) vulnerability in a login page used to access some Fortinet product services could have been exploited for highly efficient phishing attacks, a researcher reported on Friday.
read more

Continue reading

New Cerber Ransomware Speaks to Victims

A new piece of ransomware has been discovered that speaks to its victims in order to inform them that their files have been encrypted.
read more

Continue reading

Macro Malware Dridex, Locky Using Forms to Hide Code

Researchers at Trend Micro recently observed a change in the Dridex and Locky macro malware families, which are now using Form object in macros to obfuscate their malicious code.
read more

Continue reading

Amazon Quietly Removes Device Encryption From Fire Devices

Amazon has decided to kill support for encryption on its Kindle Fire devices and quietly removed it from Fire HD and Fire HDX 8.9 devices with the release of Fire OS 5 in February.
read more

Continue reading

UN Warns of ‘Pandora’s Box’ in FBI Apple Case

An FBI demand that Apple unlock an iPhone risks setting a dangerous precedent that could have a chilling effect on human rights, the United Nations rights chief warned Friday.
read more

Continue reading

Adobe to Patch Flaws in Reader, Acrobat

Adobe announced on Thursday that it will release security updates next week to patch vulnerabilities in Acrobat and Reader products.
read more

Continue reading

Study Analyzes Passwords Used in Opportunistic, Criminal Attacks

Security firm Rapid7 has conducted a year-long study to find out which are the usernames and passwords most commonly used by malicious actors in criminal and opportunistic attacks.
read more

Continue reading

Tech Rivals Join Apple’s Legal Fight Against FBI

A broad array of technology firms and activists joined Apple's legal fight over encryption Thursday, warning of a dangerous precedent if the company is forced to help the government break into a locked iPhone.
read more

Continue reading
  • Previous
  • 1
  • ...
  • 262
  • 263
  • 264
  • ...
  • 272
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it