Some articles written by the members of our community: the topics could vary from regulations to new technologies, from some new threats to privacy.
How to participate?
You are welcome to participate to our blog, you can contribute at different levels: you could share the articles or make comments to our posts. In case that you are an expert in CyberSecurity you could write us to publish your article.
In November 2014 the Yahoo's database was violated by hackers that were able to penetrate the systems. The vulnerability allowed them to steal confidential information for more than 500 million accounts, but Yahoo disclosure this information to the public only in September 2016, almost 2 years later.
In this article, you will find an analysis, from a jurist point of view, on the possible resolution of cyber-security threat from the ever-expanding Internet of Things (IoT) or connected objects
New discovers about the attack to Yahoo in November 2014: the attack started in August 2013, where also passwords and other sensible data were compromised, including the source code of Yahoo that allowed the second attack that allowed to bypass the authentication to the portal.
The connected things (IoT) and the protection of privacy in EU. New development, security requirements every consumer and IoT producer should be aware of: any “Thing” can potentially become connected, surrounding us with a growing number of computers never turned off.
1) A robot may not injure a human being or, through inaction, allow a human being to come to harm. 2) A robot must obey the orders given it by human beings except where such orders would conflict with the First Law: could the IoT violate one of the Asimov's laws?
Tuesday the 29th of November in Great Britain has been approved a new law that extends the online surveillance powers of the government and the police over the citizens. The law, called 'Investigatory Powers Act 2016', obtained the 'royal assent', that means that has been approved by the Queen.