Author Archives: rassegna.stampa

Tutorial: Code Review

Here’s the full tutorial on Code Review

Tutorial: Network Scan

Here’s the full tutorial on Network Scan

Tutorial: Vulnerability Assessment

Here’s the full tutorial on Vulnerability Assessment

Tutorial: VPN Configuration

Here’s the full tutorial on VPN Configuration.

SMAU Milan 2017: Swascan is coming!

Swascan will be part of this event First thing first: SMAU – where and when? Very easy: from 24 to 26 of October 2017 in Milan, Italy! We are in FieraMilanoCity, pavillon 4, stand B24. We strongly believe that these matters should be acknowledged by anyone who’s involved in a business. That’s why Swascan gives Read more »

Elis Open Italy 2017: Swascan will be there

Swascan and its will to innovate Since the beginning Swascan tried to innovate and grow side by side with its main competence. Our company focused on its core technology to develop something new, something easy to use and understand and something that would keep up with the innovation around. Offering a user friendly cloud-based solution that Read more »

CyberTech Europe 2017: Swascan will attend!

What about us? September is an important month for us. No doubt about that, and this is testified with our attendance to the most important European CyberSecurity conference: CyberTech Europe 2017.  Come to visit us! Swascan will be in the Innovation Pavillon in CyberTech Europe 2017, and present the product to the most important cyber people of the Read more »

Raoul Chiesa: the most famous italian hacker

Raoul Chiesa “Known” as Nobody in the eighties and nineties, Raoul Chiesa starts his web aventureat the age of twelve. In the first place, he sneaks into militar and governative institutions and banks too. Internationally famous, he affirms his role and shows his skills sneaking into Banca d’Italia in 1995. Shortly after, SCO (Central Operative Read more »

Equifax data breach, Swascan explains what happened

Equifax data breach It should be easy for a victim to shut down the card, get new credentials and avoid losing money when a credit card is stolen. The real problem emerges with data that cannot be changed. Such as Social Security numbers or personal information. That is what happened in the recent cyber-attack that Read more »

Cybersecurity expense: constant growth

Hackers force companies. Their cybersecurity expense grows constantly. Recent hacks highlighted the weaknesses of cybersecurity measures in many companies. Starting from this, as a lot of recent reviews show, companies started thinking about their own cybersecurity tools. The result is obvious. The amount invested in cybersecurity grows along with their concerns of other attacks (look Read more »