The process that transforms a hoax in a “phenomenon”, in particular on the social media, is simple. It is based on the vulnerability of the audience, and on the news/topics cycle.
The European Union and the ENISA are organizing Cyber Europe 2018 (CE2018), a maxi exercise of cybersecurity against the dangers of the sector, posed by cybercrime, terrorism and state hackers.
On the web the are tons of APPS that allow even the less experienced to try to hack smarphones and tablets. From Thechincidents the Top List of them.
New measures for telecom operators and online service providers in the draft of Loi de programmation militaire (LPM) 2019-2025. They will be required to play a more active role in protecting communications with the help of ANSSI.
Fake News exists since journalism and espionage were born. It has been called deception, misinformation, “poisoned bait”, or hoax. Internet has only accelerated the spread of it. It's necessary to reconstruct the difference between information and opinion.
USA, UK, Canada, Australia and New Zealand have issued official statements on the malware aggression, pointing the finger on Moscow and condemning the cyberwarfare behaviour.
Mobile phones today have become an indispensable tool and an integral part of families. But apart from benefits, they bring risk. With cyber attacks it’s possible to access the victims' most sensitive and personal informations.
New Tweet from the muslim hackers group: Bombs left by Islamic State fighters before they ran away are being cleared, as we clear your waste on the internet.
A cyber aggression disrupted the Games opening ceremonies in Republic of Korea. No official info on the source, but Olympics were affected by another attack with malware in January.
Joseph Steinberg - one of the top cyber experts, CEO, and technology influencer - gives some advice to increase cybersecurity without going crazy.