Redazione RHC - December 26th, 2025
TIME magazine's selection of a "Person of the Year" is a tradition dating back to 1927, when the award was given to Charles Lindbergh after his historic solo crossing of...
Redazione RHC - December 20th, 2025
There you have it! On December 20, 1990, something epochal happened at CERN in Geneva. Tim Berners-Lee , a British computer genius, created the first website in history, info.cern.ch ,...
Redazione RHC - November 21st, 2025
A major outage in Cloudflare's infrastructure has unexpectedly tested the robustness of the cloud and its security systems for many businesses. On November 18, service outages caused websites around the...
Daniela Farina - November 17th, 2025
Many still maintain that hikikomori is an exclusively Japanese phenomenon. Yet, scientifically, numerous studies now confirm the existence of cases similar in characteristics to Japanese hikikomori in Spain, France, Italy,...
Redazione RHC - November 17th, 2025
It's amazing how far we've come with satellite navigation in the last 40 years. GPS (Global Positioning System) is one of the most useful things to have ever come out...
Redazione RHC - November 17th, 2025
In November 2025, the Go programming language turned 16 years old. It was released publicly on November 10, 2009 , as a Google experiment to create a simple and fast...
Redazione RHC - November 15th, 2025
Quishing is an emerging form of cyberattack that combines traditional phishing with the use of QR codes , tools now familiar to many. The term " quishing " is a...
Redazione RHC - November 12th, 2025
Kevin Mitnick (code name Condor) is perhaps the most famous hacker of all time. He is an American hacker, IT security consultant, ethical hacking expert, public speaker, and writer. He...
Stefano Gazzella - November 12th, 2025
Unfortunately, personal data is a highly attractive and valuable market for cybercriminals, for reasons that are not at all difficult to imagine . We're not just talking about scams or...
Sandro Sana - November 11th, 2025
In the ever-evolving digital world, cybersecurity threats are becoming increasingly sophisticated and pervasive. Companies in every industry face a growing challenge in protecting their sensitive data and customer information. In...