Editorial

Protect your company from the risks of metadata shadows
Editorial Protect your company from the risks of metadata shadows

Metadata represents the context generated by and/or surrounding all digital communications, or the traces left by digital data during its processing and digital existence. Since it may be construed as a digital halo that reflects the characteristics of the user data, metadata can be used for

Fast&dangerous: do you know the risks of URL shorteners?
Editorial Fast&dangerous: do you know the risks of URL shorteners?

URL shorteners are right under our eyes. You may have noticed how for a while now many of the links shared online, especially (but not exclusively) on social networks started to look like “http://tinyurl.com/SomethingSomething”. Replace tinyurl with goo.gl or bit.ly (where in both cases the inc

What do you know on language-theoretic security?
Editorial What do you know on language-theoretic security?

Language-theoretic security or LangSec is a cyber-security approach that aims at eliminating cyber-risks from their programming roots. From this new perspective, all Internet cyber-risks originate in ad-hoc programming and untrusted inputs that form layer upon layer of coding with potential

When threats lay dormant in your wireless peripherals
Editorial When threats lay dormant in your wireless peripherals

It is an element of progress to have our mouse or keyboard wirelessly communicating with the computer, but have you ever wondered what dangers lie dormant in this efficient technology? A pair of Bastille researchers decided to verify just how vulnerable remote peripherals are  to malicious attacks

Acoustic fingerprinting, suspended between privacy and marketing tech
Editorial Acoustic fingerprinting, suspended between privacy and marketing tech

If the denomination of acoustic fingerprinting does not fully reveal the core concept, then maybe defining this type of fingerprinting as the mark/pattern based on a digital summary extracted from a short audio signal (summary that includes identifying, recognizing and tracking the audio source)

Have you considered improving your IR strategy?
Editorial Have you considered improving your IR strategy?

The Incident Response procedure (or IR strategy) is part of the cyber-security control measures. Following prevention and detection, the IR strategy is critical for the situations where the system has been affected by a breach or by another cyber-security event. A coherent IR plan should comprise

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later