- Imam, Hussein e gli altri predicatori erranti: la via dei Balcani per colpire l’Italia
- Counter-terrorism in Italy: prevention and control over the territory
- The distribution platforms of ISIS propaganda - UGC, websites, file hosting
- AQ 9/11 Anniversary Message
- 20,000 ISIS military uniforms seized in Spain
The Ashley Madison case
Some days ago, Forbes published an article of Jason Bloomberg (http://www.forbes.com/sites/jasonbloomberg/2015/07/23/ashley-madison-extortion-attack-critical-lessons-for-enterprise-cybersecurity/3/) highlighting some important lessons learned from this case. All the organizations are vulnerable to attack, but also “they have already been attacked”. So the real question to pose “is not when the attack might occur, but how long hackers have been inside a network and how best to mitigate further damage”. “Hackers are usually thieves, looking for financial gain. Some times they are vandals,…
Read More