Antonio Ieranò

Attraversando l’Italia

A sinistra le case arroccate a destra il mare, questo scorre dai finestrini, talvolta oscurato da un tunnel, mentre vado da Pavia a Roma. Devo ammettere che il colpo d’occhio è notevole, e questo scorcio di Liguria che mi corre sotto gli occhi è assolutamente fantastico. Sono in viaggio da poco più di una ora,…

Attraversando l’Italia was originally published on The Puchi Herald Magazine

check out my new article on hakin9

http://hakin9.org/read-hakin9s-qr-code-hacking-issue-and-get-knowledge-how-to-protect-yourself-from-data-loss/ Read Hakin9‘s QR Code Hacking Tutorial and Learn How To Avoid Data Loss You received this newsletter because you subscribed to autoresponder address list of Hakin9 magazine. If you want to unsubscribe please click the link. Dear Readers, we are pleased to inform you that our new tutorial about QR code hacking has just arrived. You can download it here. In this issue you will find articles such as: QR Code Hacking BASICS Hacking QR CodesBy Rishabh Rastogi An information security, risk and governance minded professional who thrives on evaluating technologies and business processes from a critical perspective. Popularly…

E-mail requirements change for a safe use in the post PRISM internet

Recently is mounting a serious concern about e-mail use and misuse, after PRISM the question is if e-mail can still be used as a safe communication media both for personal and enterprise use. This is a difficult question since e-mail has always been a low security- high risk area in the enterprise as well as in the private world. When talking about mail we should remember what email really is: Email is a simple method to transfer information from a computer to another, the used protocol SMTP is a plain text protocol that pass all the information in clear text….

Digging it up on Security Costs and Security Budgets – part1

In my previous article, security costs and security budget, I made some assumption to simplify an introductory analysis on how much we should spend on security. Some of those assumptions have been made to simplify out tasks. Today I would like to quickly analyse some of those simplifications. One of the biggest assumption I made on the previous article is that if a problem cost us X then we can find a number n that express the number of incidents I’m allowed to permit so that nX can express the cost I’m allowed to accept. This simplification was based on…

Security Costs and Security Budgets

When I’m talking about security with customers, partners or at an event the first question I usually receive is: “how much this will cost to me?” This is an understandable question, costs have to be monitored and expenditure have to be planned wisely, the problem of  how much I canshould spend on security is a quite interesting topic. The problem, alas, is that usually IT managers do not use a clear model when planning investment in security but seamed to be attracted more by strange inner believes than a empirical analysis of cost and benefits. Another point that I’ve always found quite curious is that I’ve…

Looking for a new career opportunity

Dear All, As you may know I’m looking for a new career opportunity. Many of you knows me because we have been working together in Europe or USA in one of my previous work experiences, including Cisco, Ironport, Symantec, BrightMail, Mondadori Informatica and so on, or met in conferences and events. With over 16 years of experience in the leadership of IT product development, project management, marketing, and representation and as a reputable and renowned contributor to the tech industry particularly within the security community, I think I have often provided outstanding results and proved my soft and technical skills, but the situation now force…

Dell PowerEdge VRTX

PowerEdge VRTX shared infrastructure platform check it here: http://www.dell.com/us/business/p/poweredge-vrtx/pd I usually do not make comment on HW infrastructures or platforms but I have to admit that today, after a chat with my neighbourhood, I fall in love with this one. When thinking about SMB market and IT we always face a dualism between computational and storage needs and, on the other side, strict budgets and low resources. Low resources also means space, energy, people constrains and so on. So here we are a small object, that contains all the HW needed for a SMB or a branch, flexible and easy to manage. Drive Bays Up to…

FW SPAM:

This come without subject but the content is quite clear —–Original Message—– From: patcod [mailto:patcod@hot.ee] Sent: Thursday 18 July 2013 04:09 To: info@yahoo.com Subject:     I am in the military unit here in Afghanistan,we have some amount of funds that we want to move out of the country.My partners and I need a good partner someone we can trust. It is risk free and legal. Reply to this email majoralanedward12@kimo.com Sincerely Major.Alan Edward Related posts: Hakin9 StarterKit 2/2011 – DDOS Attacks | Magazine | IT Security … Talking Points – Security week review The IoT Files: Culture “Chinglish” –…

FW SPAM: Ultimo sollecito attivazione sistema Sicurezza web Postepay

For my Italian friends, Postepay Spam —–Original Message—– From: Servizi finanziari Postepay [mailto:support@update.com] Sent: Tuesday 16 July 2013 09:06 Subject: Ultimo sollecito attivazione sistema Sicurezza web Postepay   Gentile cliente,     Dal 17° luglio 2013 non potrai utilizzare la tua prepagata PostePay se non hai attivo il nuovo sistema di sicurezza web.     Il nuovo sistema di Sicurezza Web PostePay e una soluzione innovativa che garantisce maggiore sicurezza e affidabilita per le operazioni dispositive con PostePay effettuate online sui siti de Poste Italiane.     Il nuovo sistema per l`autorizzazione delle operazioni di pagamento (ricariche PostePay,ricariche telefoniche,pagamento bollettini)…

FW SPAM: My dear friend

I’m crying —–Original Message—– From: hjgrelee@daum.net [mailto:hjgrelee@daum.net] Sent: Tuesday 16 July 2013 11:27 To: mrsleejesicca@yahoo.com.au Subject: My dear friend My dear, My name is Mrs. Jesicca Lee; a dying woman who has decided to donate what I have for the good work of charity. I was diagnosed for breast cancer for about 2 years now.I have been touched by God to donate from what I have inherited from my late husband to you for the good work of God, rather than allow my husband evil relatives to use my husband hard earned funds ungodly. They don’t care about man kind,…

Posts navigation