Cybersecurity

hacker

Hacking, cyberwar, Information Warfare and Cyber Espionage

The historical evolution, profiling and geopolitical aspects of the 21st century hacking phenomenon

The event offers a concise yet detailed analysis of the “hacking phenomenon”, starting from the 1980s and the so-called “Wargames Generation” up to modern times and the extremely current “synergies” in Information Warfare, Cyber Espionage and Cyberwar. It also deals with the highly innovative and ground breaking issue of Hacker Profiling, thanks to the thirty-year […]

Banksy

Geographic profiling to investigate

(Banksy and a Gestapo case from the 1940s)

  Cybersecurity The Web is structured like a close-knit weft of data and relations and so captures traces, evidence and information that can reveal hidden identities, reconstruct movements and reveal illegal dealings. This is the land of the Web that extends beyond the confines that we all know and in which we are used to […]

Anonymous-OS-Screenshot

The Dark Side of the Web

A journey into the Deep Dark Web of Good and Evil

The underground network of anonymous personages, hackers, secret services, traffickers, criminal bands and clans: what it is and how it works. The role of the Bitcoins.   Cybersecurity The Web is structured like a close-knit weft of data and relations and so captures traces, evidence and information that can reveal hidden identities, reconstruct movements and […]

hacking

IT thieves and the legal process

From recent sentences to the future legislative reality

It was during last year’s scorching summer that the Hacking Team case emerged. It’s only really thanks to this attack on the computer system of the Milanese company that created the Galileo Suite remote control software that public opinion began to understand the concept of “computer thieves” that up to then had been relegated to […]

fbi-iphone-apple

Apple vs FBI

At the centre of this story lies an iPhone. Not just any old iPhone, but the one used by the San Bernardino killer, Syed Farook. Two giants go head to head: on the one side is Apple, the company responsible for producing the smartphone, on the other is the FBI, which the American department of […]

hacker

State-sponsored hacking : surveillance, espionage and cyberwarfare

The impact of organised hacker groups – government and otherwise – on geopolitics and the security of all users.   Cybersecurity The Web is structured like a close-knit weft of data and relations and so captures traces, evidence and information that can reveal hidden identities, reconstruct movements and reveal illegal dealings. This is the land […]

noir

The perfect investigation: from real crimes to noir fiction

  Cybersecurity The Web is structured like a close-knit weft of data and relations and so captures traces, evidence and information that can reveal hidden identities, reconstruct movements and reveal illegal dealings. This is the land of the Web that extends beyond the confines that we all know and in which we are used to […]