©IPA/Fotogramma
In a world that is increasingly connected and increasingly linked to Internetis critical protect your sensitive data online using password effective. A rule that underlies the World Password Daywhich is celebrated every year on first Thursday of May
How cyberattack insurance works
© Ansa
According to one research based on data from the observatory on the state of cybersecurity in Italy conducted by Angi research, in collaboration with Lab21.01, the 58% Italians share data on the web concerning information personal data basic while the 27% provides its own data credit cardsThe 12% documents of identity personal and the 3% pin and password personal
Credit card theft: the countries most affected
© Ansa
Compared to last year, those who believe that there should be a growth (+3%) investment greater by the government for protection in the area cybersecurity (72%) while against they decrease those who believe that cybersecurity should be Taught as a school subject already in the primary study cycles (-2%)
Cybersecurity, Maya Horowitz: “The new attacks are destructive”
To keep your data safe, you need to start with a few simple ones precautionsas he recalls ToothPic, industry startups cybersecurity founded by Diego Valsesia, Giulio Coluccia, Tiziano Bianchi and Enrico Magli, researchers and professors of Department of Electronics of the Turin Polytechnic
Sophos, here are the attack techniques most used by hackers
©IPA/Fotogramma
Tooth Pic has invented, designed, developed and patented a solution to transform every smartphones in a secure key for authentication online, taking advantage of the hidden and involuntary signature that each camera leaves
How to see if your data has been stolen and what to do
©IPA/Fotogramma
The startup has drawn up a handbook with some precautions to be taken for reduce the risk of possible credential theft and keep your data safe online
©IPA/Fotogramma
Do not reuse the same password to access more services
Avoid clicking on links contained in messages or emails, even if arriving from senders who at first glance are trusted or known, in which they are asked authentication data
©Getty
Update passwords that are too weak which can facilitate hackers, allowing them to intervene with attacks aimed at brute force (brute force)
©Getty
Protect smartphones and computers with a code, a password or one biometrics which makes its content at least safe
©Getty
Always activate themultifactor authenticationfavoring authenticators based on tokens or app compared to codes sent via sms
©Getty
“The theft and compromise of passwords and credentials access to web services are the most common vulnerabilities e are the cause of almost 40% of cyber attacks”warn the founders of Tooth Pic
Conti Group, how a cybercrime organization works
Source-tg24.sky.it