The event offers a concise yet detailed analysis of the “hacking phenomenon”, starting from the 1980s and the so-called “Wargames Generation” up to modern times and the extremely current “synergies” in Information Warfare, Cyber Espionage and Cyberwar. It also deals with the highly innovative and ground breaking issue of Hacker Profiling, thanks to the thirty-year […]
Cybersecurity The Web is structured like a close-knit weft of data and relations and so captures traces, evidence and information that can reveal hidden identities, reconstruct movements and reveal illegal dealings. This is the land of the Web that extends beyond the confines that we all know and in which we are used to […]
The underground network of anonymous personages, hackers, secret services, traffickers, criminal bands and clans: what it is and how it works. The role of the Bitcoins. Cybersecurity The Web is structured like a close-knit weft of data and relations and so captures traces, evidence and information that can reveal hidden identities, reconstruct movements and […]
It was during last year’s scorching summer that the Hacking Team case emerged. It’s only really thanks to this attack on the computer system of the Milanese company that created the Galileo Suite remote control software that public opinion began to understand the concept of “computer thieves” that up to then had been relegated to […]
At the centre of this story lies an iPhone. Not just any old iPhone, but the one used by the San Bernardino killer, Syed Farook. Two giants go head to head: on the one side is Apple, the company responsible for producing the smartphone, on the other is the FBI, which the American department of […]
The impact of organised hacker groups – government and otherwise – on geopolitics and the security of all users. Cybersecurity The Web is structured like a close-knit weft of data and relations and so captures traces, evidence and information that can reveal hidden identities, reconstruct movements and reveal illegal dealings. This is the land […]
Cybersecurity The Web is structured like a close-knit weft of data and relations and so captures traces, evidence and information that can reveal hidden identities, reconstruct movements and reveal illegal dealings. This is the land of the Web that extends beyond the confines that we all know and in which we are used to […]
Get in touch