The last article


Backdoor: Open Source Security

There was a backdoor to infect them all, but one genius saved the web



Here's how the expertise of a developer, and a little... providence, just prevented the sabotage of Linux and the entire Internet

Read more

Mobile payments: today there are many possibilities for mobile payments: especially smartphones, smartwatches or other wearable devices can be used for this purpose

Why are mobile payments still late in Germany?



High commissions, habit of cards and cash, distrust and advanced age of consumers and cybersecurity risks discourage Germans...

Read more

Digital art: the advent of artificial intelligence has opened new horizons in the artistic field

All the reasons for the growing influence of AI in digital art



Analyzing the impact of generative AI on culture, society, and how we perceive traditional artistic expression

Read more

Rack: Eaton's G4 PDU is the end-to-end solution with low environmental impact, combining energy savings with advanced and reliable performance

From Eaton the innovative rack for new generation data centers



The G4 PDU is the end-to-end solution with low environmental impact, which combines energy saving with advanced and reliable performance

Read more

Stolen documents: a "data leak" containing 26 billion pieces of information and measuring 12 terabytes has been discovered

26 billion stolen documents hidden in one virtual location



Largest data breach in web history discovered: 12 terabytes of information from LinkedIn, Twitter, Tencent and other social networks

Read more

Artificial intelligence: an application that implements it

This is how AI-based systems have hidden moral values…



A new study by the University of Mannheim and the Leibniz Institute on large language models reveals potentially harmful biases

Read more

Shopping: AI is revolutionizing purchasing behavior with predictive personalization

Here's how AI is revolutionizing purchasing behavior



Predictive personalization will be able to anticipate consumer needs, creating offers based on user history

Read more

Swiss Digital Days: the 2023 presentation of the

Epilogue in Lucerne in the future for the “Swiss Digital Days” 2023



From the Swiss Museum of Transport and digitalswitzerland the choice of a new meeting place at the end of three months spent here and there to the fullest

Read more

Cybersecurity: computer security, cyber-security, digital security, computer security

A free webinar to explore cybersecurity in depth



On November 8th, everyone will be online with international experts Fabio Rugge and Erika Buenrostro on strategies to combat hacking and phishing

Read more

EU-US Data Transfer: Guide to GDPR Regulations and Requirements

EU-US Data Transfer: Guide to GDPR Regulations and Requirements



Control the passage of personal and sensitive information between the European Union and the United States of America in compliance with the rights of companies and operators

Read more

IT risks: the key visual of

IT risk management: the profession is learned in Ticino



The ATED course, limited number and in its second edition, for the preparation for the 2023 federal exam of Cyber ​​Security Specialist is about to start

Read more

Child pornography and sharenting: web threats for minors

The drama of child pornography in the time of sharenting



What happens to your children's photos posted on social media? The problem of the tragic confluence between pedophilia and pornography explained to all

Read more

Featured


Mobile payments: today there are many possibilities for mobile payments: especially smartphones, smartwatches or other wearable devices can be used for this purpose

Why are mobile payments still late in Germany?


High commissions, habit of cards and cash, distrust and advanced age of consumers and cybersecurity risks discourage Germans...

Digital art: the advent of artificial intelligence has opened new horizons in the artistic field

All the reasons for the growing influence of AI in digital art


Analyzing the impact of generative AI on culture, society, and how we perceive traditional artistic expression

Rack: Eaton's G4 PDU is the end-to-end solution with low environmental impact, combining energy savings with advanced and reliable performance

From Eaton the innovative rack for new generation data centers


The G4 PDU is the end-to-end solution with low environmental impact, which combines energy saving with advanced and reliable performance

Stolen documents: a "data leak" containing 26 billion pieces of information and measuring 12 terabytes has been discovered

26 billion stolen documents hidden in one virtual location


Largest data breach in web history discovered: 12 terabytes of information from LinkedIn, Twitter, Tencent and other social networks

Artificial intelligence: an application that implements it

This is how AI-based systems have hidden moral values…


A new study by the University of Mannheim and the Leibniz Institute on large language models reveals potentially harmful biases

Shopping: AI is revolutionizing purchasing behavior with predictive personalization

Here's how AI is revolutionizing purchasing behavior


Predictive personalization will be able to anticipate consumer needs, creating offers based on user history

Swiss Digital Days: the 2023 presentation of the

Epilogue in Lucerne in the future for the “Swiss Digital Days” 2023


From the Swiss Museum of Transport and digitalswitzerland the choice of a new meeting place at the end of three months spent here and there to the fullest

Cybersecurity: computer security, cyber-security, digital security, computer security

A free webinar to explore cybersecurity in depth


On November 8th, everyone will be online with international experts Fabio Rugge and Erika Buenrostro on strategies to combat hacking and phishing

EU-US Data Transfer: Guide to GDPR Regulations and Requirements

EU-US Data Transfer: Guide to GDPR Regulations and Requirements


Control the passage of personal and sensitive information between the European Union and the United States of America in compliance with the rights of companies and operators

IT risks: the key visual of

IT risk management: the profession is learned in Ticino


The ATED course, limited number and in its second edition, for the preparation for the 2023 federal exam of Cyber ​​Security Specialist is about to start

Child pornography and sharenting: web threats for minors

The drama of child pornography in the time of sharenting


What happens to your children's photos posted on social media? The problem of the tragic confluence between pedophilia and pornography explained to all

Cybersecurity: the presentation of the 2023 edition of the "Global Cybersecurity Outlook" at the World Economic Forum in Davos: attended by Laura Deaner, Global Chief Information Security Officer of S&P Global, David Garfield, Chief Executive Officer and Co-Founder of Garrison, André Kudelski , Chairman of the Board of Directors and Chief Executive Officer of the Kudelski Group, Jürgen Stock, Secretary General of INTERPOL and Samir Saran, President of the Observer Research Foundation (ORF)

The Davos alarm on the resurgence of global cyberattacks


The "2023 Report on global cybersecurity" presented at the WEF: higher risks with war, but are companies "on track"?

What future does social media hold for us?

What is smishing and how to protect yourself


You have won an iPhone and you should visit that site that they sent you via SMS without ever having participated in a…


The security protocols of plugins and CMS


To keep a site secure at the highest level, it is important to know the plugin and CMS protocols. Here are the…