Tech Update in English

English

Sex, Love, and Little Scams

Given the weight of recent days, the serious discussions, and the lack of handy guides from my side (which always unnerves my dear friend Alessandro Bottonelli), I thought I’d cater to my audience—mostly composed of seasoned youngsters still convinced they’re irresistible. Spoiler alert: no, your alluring neighbor who waves at you every morning from her window isn’t real. Sorry to burst your bubble. Here’s a list of the most creative and colorful romantic and sexual scams where love, blackmail, and the art of digital deception collide. Irony? Absolutely. But as they say, the heart wants what it wants… especially if…

The Cyber Resilience Act: Because One More Cybersecurity Requirement Couldn’t Hurt, Right?

Antonio Ieranò Security, Data Protection, Privacy. Comments are on my own unique responsibility 🙂 Just when you thought that European cybersecurity regulations couldn’t get more comprehensive after NIS2 (Directive (EU) 2022/2555) and DORA (Digital Operational Resilience Act), here comes another major legislative package to keep you on your toes—the Cyber Resilience Act (CRA). With digital threats evolving faster than most businesses can keep up, the European Union has taken yet another bold step to safeguard the integrity of connected products and digital services across the single market. While we’re already busy grappling with the complex frameworks introduced by the NIS2…

Cybersecurity Regulation: A Global Overview of Standards and Regional Approaches Influenced by Legal Systems

Antonio Ieranò Security, Data Protection, Privacy. Comments are on my own unique responsibility 🙂 October 10, 2024 NOTE: this is the second part of the short analisys I have been required, enjoy 🙂 Introduction In today’s increasingly interconnected world, where digital infrastructures underpin critical sectors like healthcare, finance, and energy, robust cybersecurity regulation has become paramount. Cyberattacks are growing in both frequency and sophistication, making it crucial for countries and regions to implement strong cybersecurity frameworks. These frameworks are shaped not only by the evolving nature of cyber threats but also by the underlying legal systems that influence how laws…

Shrems II, Data transfer, and the USA: wheels are rolling.

Probably everyone now has, at least, heard about the EJC sentence called Shrems III that basically rules out the possibility to use Privacy Shield infamous agreement to allow data transfer between EU and USA based on the fact that the USA does not provide enough guarantees EU data will be protected. If you don’t know (but you should) here my previous article: https://thepuchiherald.com/2020/07/17/ops-privacy-shield-bye-bye/ After the sentence one of the question was: what now? Will a Grace period be offered to survive this? (lot of companies were transferring data using privacy shield to USA) And most of all does SCC will…

The IoT Files: the call for 5G

I have been recently interviewed on 5G issues and this made me realize how confusing is the knowledge and understanding about 5G. Most of the time, when I heard on mainstream media comment about 5G I find form one side apologetic wonders of how this or that vendor with 5G can solve all human problems, form the other side fears related strictly to the fact that 5G today means Chinese or European vendors, for the first time in years the USA is not leading technologically a strategic sector. even lesser I heard about the link between 5G and IoT and what this means. Generally speaking, most of the discussions on IoT are focused…

Please help me to share for my phishing friend sake

ok, do you know those beautiful phishing emails claiming a bad guy hacked your email and take pictures or videos of you doing bad stuff? I receive tons on my personal accounts, and usually, I answer to them asking to share the videos so I can publish on my socials as well and become famous, rotfl, alas the bad guys never react…. (I know I am so childish) so let me share with you last one: Analyzing the headers I saw my friends sent the email from a chinese address (how nice to be renown from such a distant place)…

hit by “wannacry” (may be you deserve it) …

Guys Again a ransomware outbreak on the news. May I say I am not surprised at all? And may I say that the media coverage has been ridiculous and instead of presenting the event as something that should highlight the incompetent behaviour of managers targeted by this issue they claims about “cyberattack” which is a completely different thing. And yet people asking why? how come? how this can be possible? again really? We know that CyberSecurity is always a side though from most of the management no matter where. The proof, beside the claims from CEO, IT Managers and generally speaking CxO,…

NFV network function virtualization security considerations

I have been asked to write down a few things related to NFV and security. NFV is relatively a new thing in the IT world. It has been on the news in 2012 and since then it has followed the developing path common to the virtualization technologies. Virtualization has made dramatic improvement in the last years. It all started at first with simple virtualization platforms, of course VMware on top of our mind, but not only. The idea was to abstract HW platforms from software ones. Developing the idea, the abstraction growth covering multiple hw platforms moving also to the…

Firewall: Traditional, UTM and NGFW. Understanding the difference

Firewall: Traditional, UTM and NGFW. Understanding the difference One of the problem nowadays when we talk about firewalls is to understand what actually a firewall is and what means the acronym that are used to define the different type of firewalls. The common definition today recognizes 3 main types of firewalls: • Firewalls • UTM • NGFW But what are the differences (if any) between those things? Let’s start with the very basic: what a firewall is. Firewall: A firewall is software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks…

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files. Previously available as freeware and now only available as a low-cost commercial version, PGP was once the most widely used privacy-ensuring program by individuals and is also used by many corporations. It was developed by Philip R. Zimmermann in 1991 and has become a de facto standard for email security. How PGP works Pretty Good Privacy uses a variation of the public key system. In this…

Posts navigation