ICT Security Assessment

ICT Security Assessment: do you really know your Risk level?

ICT Security Assessment  -Today’s Cyber Security landscape requires the utmost attention to a set of internal macro indicators for all organisations. Maybe your organisation has an antivirus software to protect your company’s data? Or maybe you also have firewalls and encryption technology, so you think you can sit back and let the technology protect you

foreshadow

Foreshadow – Intel CPUs Affected By L1TF Vulnerabilities

Foreshadow: While the chaos for the horrifying Spectre and Meltdown is still going, researchers discover another vulnerability in Intel CPUs that is even more robust. Two different groups of researchers discovered the vulnerability named “Foreshadow” and reported it to Intel. Upon further investigations, Intel found two more related flaws, which the researchers termed as “Foreshadow-NG”.

DDOS

DDOS Distributed Denial of Service: what is it?

DDOS: introduction DDoS: Distributed Denial of Service. Whenver connections overload a server, there’s no more the chance to start new connections. This situation takes place when a lot of compromised systems send at the same time data traffic to the target system, causing its crash. Such an overload could make a server, a website or an online

IP address

IP address: introduction and explanation

IP address: introduction You can visualize the IP address or “internet protocol address” in the graphic interface as a numerical label. It allows to univocally identify a host (which is a physical device such as a computer, a printer, a router or a smartphone). The host is connected to a network that uses the internet