Stefano Gazzella - November 9th, 2025
Once upon a time, there was a town that had a Magical Forest. It was happy to have it, even a little proud. Which is why all the citizens willingly...
Fabrizio Saviano - November 7th, 2025
The same malware that yesterday blocked the servers of a major bank today encrypts Mrs. Pina's photos on her home PC. As? With an innocuous WhatsApp message, sent by his...
Redazione RHC - October 31st, 2025
Starting Tuesday, November 12, 2025, new provisions from the Italian Communications Regulatory Authority (AGCOM) will come into force, requiring an age verification system for accessing pornographic websites. The measure, provided...
Redazione RHC - October 27th, 2025
Member countries of the international monitoring group MSMT have concluded that North Korea is increasing its use of cybercrime and the remote work of its citizens abroad to circumvent international...
Sergio Corpettini - September 30th, 2025
In 2025, the European Union wants full control over private chats. The “Chat Control” regulation (proposal COM(2022)209) claims to fight child pornography by scanning private messages on WhatsApp, Telegram, Gmail,...
Alessio Stefan - September 8th, 2025
The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been very common...
Redazione RHC - June 24th, 2025
The United States has warned of possible cyber attacks by pro-Iranian groups following a series of airstrikes against Iranian nuclear facilities, as part of the armed conflict between Iran and...
Redazione RHC - June 23rd, 2025
Donald Trump's return to the White House has becomea painful reminder for Europe of its main digital vulnerability: the "kill switch" effectively controlled by the United States. Political risks that...
Alessio Stefan - March 18th, 2025
Politics, information technology, and privacy. A triad continually seeking balance with a history of conflict that originates from the introduction of personal computers at the consumer level. Attempts by the...
Olivia Terragni - March 18th, 2025
The Dark Storm attack on X (formerly Twitter) has been significant for several reasons. The attack on March 10 2025 - a multi-layered Distributed Denial-of-Service (DDoS) using a botnet -...