Tech Update in English

English

From AI to Aia: A Short (and Painful) Step

Everyone’s talking about Artificial Intelligence… often without intelligence and even less art. 🤖💥The latest tech drama? A new low-cost Chinese model, DeepSeek. Some are crying “Tech theft!”, others are hyping it as a “Revolution!”, and then there’s the crowd that still thinks ChatGPT is the only game in town.But the real question remains: Is AI a genius or just a high-tech liability?🎯 Is it truly useful, or just a stylish spy?🎯 Will it make us more productive or just better categorized for profiling?🎯 And most importantly: can we outsmart AI before it starts outsmarting us?After all, a hammer can drive…

The Remote Ruse: How Cybercriminals Exploit Remote Monitoring and Management Tools (And How Not to Be Their Next Comedy Act)

🚨 Your IT Department’s Worst Nightmare: When RMM Tools Go Rogue! 🚨 Imagine this: Your IT team is chilling, sipping their well-earned coffee, when suddenly—BOOM! Cybercriminals have just hijacked your Remote Monitoring and Management (RMM) tools, turning your secure network into their personal playground.RMM tools are supposed to help IT teams keep things running smoothly. But in the wrong hands? They become digital skeleton keys, unlocking systems, deploying malware, and causing mayhem faster than you can say, “Who clicked that phishing link?” 😱In my latest article, I take a deep dive into how hackers manipulate legitimate RMM tools like AnyDesk,…

Security? More Like “Oops!”—The Human Factor in Cyber Chaos

🚨 Breaking News: Humans Still Clicking on Sketchy Links! 🚨 You’ve trained your employees. You’ve deployed cutting-edge security. You’ve implemented MFA. And yet… someone still clicked on the “Free iPhone 15” link in their email. 🎣Welcome to Human Factor Security, where the greatest vulnerability isn’t your software—it’s Dave from Accounting.From phishing emails to TOAD (no, not the Mario Kart one—Telephone-Oriented Attack Delivery), cybercriminals are weaponizing human gullibility faster than you can say “reset your password.” And if you think MFA is your ultimate shield, well… let me introduce you to Adversary-in-the-Middle (AitM) attacks.In my latest article, I dive into: 🔹…

The Human Factor and Security: A Love-Hate Relationship

The Human Factor and Security: A Love-Hate Relationship There’s been a lot of chatter lately about the “human factor” in security. You’ve probably heard the slogans: “Humans are the weakest link in the security chain!” or “If it weren’t for users, security would be easy!” And let’s be honest—there’s some truth to these claims. But what does this really mean? And are humans truly the villains of the cybersecurity world? Let’s dig in, shall we? 🕵️♂️ Humans move data, communicate, and make decisions. Without these activities, work would be pointless. Unless you’re a hardcore nerd writing code 100% of the…

The Rise and Fall of Password Gods: Aunt Gertrude’s Descent into the Rabbit Hole of Hashes and Salt

The Rise and Fall of Password Gods: Aunt Gertrude’s Descent into the Rabbit Hole of Hashes and Salt If Aunt Gertrude realised just how critical the security of her meatball recipe was, she’d probably consider hiring a CISO to guard her kitchen. Alas, her recipe—like most passwords—lives in a precarious state: a scrap of paper tucked under her casserole dish. And much like the rest of us, she underestimates the consequences of poor password hygiene. Table of Contents Introduction Password Length, Complexity, and the Human Factor The Hidden Dangers of Password Storage Windows Password Storage: The NTLM Saga Linux Password…

Passwords Passphrases, and the mystery of aunt Gertrude’s meatballs

PASSWORDS, PASSPHRASES, AND THE MYSTERY OF AUNT GERTRUDE’S MEATBALLS (Or, How to Secure Your Digital Life While Laughing About It) Note: Reading is recommended with a good supply of tea, coffee, or meatballs (depending on your time zone and hunger levels). Welcome to the semi-serious universe of cybersecurity, where our worst digital nightmares mix with family recipes, jokes about common passwords, and technical insights into cryptography. Table of Contents 1. Introduction: Why Talk About Passwords and Meatballs? Imagine an ordinary day. You’re about to access Aunt Gertrude’s top-secret recipe for the world’s best meatballs (rumored to contain a pinch of…

🎄 Beware of Holiday Scams: The Ultimate Guide to Dodging Yuletide Cons and Beyond! 🎄

Antonio Point of View 2,868 subscribers Subscribed 🎄 Beware of Holiday Scams: The Ultimate Guide to Dodging Yuletide Cons and Beyond! 🎄 Antonio Ieranò Security, Data Protection, Privacy. Comments are on my own unique responsibility 🙂 Ah, the holiday season knows no borders… and neither do scams! Here, you’ll find a selection of the most common scams at various times of the year, each with its own regional quirks and favourite communication channels. 🎅 Holiday Anti-Scam Tips 🎅 Before clicking that link or responding to strange requests, take a pause. The real Santa Claus never asks for bank details, and…

Sex, Love, and Little Scams

Given the weight of recent days, the serious discussions, and the lack of handy guides from my side (which always unnerves my dear friend Alessandro Bottonelli), I thought I’d cater to my audience—mostly composed of seasoned youngsters still convinced they’re irresistible. Spoiler alert: no, your alluring neighbor who waves at you every morning from her window isn’t real. Sorry to burst your bubble. Here’s a list of the most creative and colorful romantic and sexual scams where love, blackmail, and the art of digital deception collide. Irony? Absolutely. But as they say, the heart wants what it wants… especially if…

The Cyber Resilience Act: Because One More Cybersecurity Requirement Couldn’t Hurt, Right?

Antonio Ieranò Security, Data Protection, Privacy. Comments are on my own unique responsibility 🙂 Just when you thought that European cybersecurity regulations couldn’t get more comprehensive after NIS2 (Directive (EU) 2022/2555) and DORA (Digital Operational Resilience Act), here comes another major legislative package to keep you on your toes—the Cyber Resilience Act (CRA). With digital threats evolving faster than most businesses can keep up, the European Union has taken yet another bold step to safeguard the integrity of connected products and digital services across the single market. While we’re already busy grappling with the complex frameworks introduced by the NIS2…

Cybersecurity Regulation: A Global Overview of Standards and Regional Approaches Influenced by Legal Systems

Antonio Ieranò Security, Data Protection, Privacy. Comments are on my own unique responsibility 🙂 October 10, 2024 NOTE: this is the second part of the short analisys I have been required, enjoy 🙂 Introduction In today’s increasingly interconnected world, where digital infrastructures underpin critical sectors like healthcare, finance, and energy, robust cybersecurity regulation has become paramount. Cyberattacks are growing in both frequency and sophistication, making it crucial for countries and regions to implement strong cybersecurity frameworks. These frameworks are shaped not only by the evolving nature of cyber threats but also by the underlying legal systems that influence how laws…

Posts navigation