A brief technical introduction to some of the most common (and dangerous) attacks you receive every day in your Inbox: how do they work, what are the consequences, how can you avoid them?
Events - hackers' corner
Ever since Wikileaks captured the headlines and the imagination of journalists all over the world with its shocking Collateral Murder video, large leaks of data, often obtained through hacking, have b...
Two Italians referred to as the “Occhionero brothers” have been arrested and accused of using malware, codenamed "EyePyramid", and a carefully-prepared spear-phishing scheme to spy on high-profile...
More than 200 million people got online for the first time in 2016. But in many cases, the type of internet that they accessed was already controlled and censored by their governments or internet serv...
The Internet of Things (IoT) lets us interact, plan and manage activities with a unique convenience. But at the cost of undermining both security and privacy. During this session we will discuss : ...
After the Snowden revelations, massive encryption of internet communications started to take-off, reducing the investigative power of law enforcement and security agencies that, in turn, increased the...