Remove 2014 Remove Computer and Electronics Remove Cybersecurity Remove How To
article thumbnail

University, Professional Certification or Direct Experience?

Security Affairs

How to improve technical skills? Would it be better a university course , a professional certification or an experience in a cybersecurity firm? Today I’d like to share a simple and personal thought about teaching models on cybersecurity. I am a computer security scientist with an intensive hacking background.

article thumbnail

Malware Training Sets: FollowUP

Security Affairs

Since that day I received hundreds of emails from students, researchers and practitioners all around the world asking me questions about how to follow up that research and how to contribute to expanding the training set. I am a computer security scientist with an intensive hacking background. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Scraping the TOR for rare contents

Security Affairs

Cyber security expert Marco Ramilli explains the difficulties for scraping the ‘TOR networks’ and how to enumerate hidden-services with s crapers. I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna.

article thumbnail

From Targeted Attack to Untargeted Attack

Security Affairs

It took some minutes to understand how to move from the obfuscated version to a plain text readable format as shown in the next picture. I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna.

article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

In an amendment to the EU’s 2014 Radio Equipment Directive (RED), the European Commission noted that as wireless devices, from mobile phones to fitness trackers to smart watches, become increasingly embedded into everyday consumer and business life, they also become a greater security risk. Common EU Security Standards.

IoT 107
article thumbnail

Indonesia Soon to Become the Fifth ASEAN Country to Adapt Data Privacy Laws

Security Affairs

Any data that can be identifiable on its own or combined with other information, both direct and indirect through electronic or non-electronic systems. How To Protect Your Data Until the Law Is Fully Implemented? . Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. General personal data v.

article thumbnail

MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry

Security Affairs

Those objects are real Encrypted Ole Objects where the Encrypted payload sits on “EncryptedPackage” section and information on how to decrypt it are available on “EncryptionInfo” xml descriptor. I am a computer security scientist with an intensive hacking background. 1 and OleObj.2. Edited by Pierluigi Paganini.