Stiamo tostando un nuovo caffe' !



cerca caffe20 on Spreaker caffe20 on Spotify Twitter Alexa caffe20 on Estensione caffe20 on iTunes caffe20 on Google Calendar

I link a disposizione dei "caffeinomani" per approfondire alla fonte. Vuoi collaborare ?

Cyber Resilience Act: requisiti fondamentali e prodotti coinvolti Cyber Security 360
Cybersecurity360.it · 2022-09-22 23:14:23 estimated reading time: 5 min È stata di recente pubblicata la proposta di legge UE riguardante la cyber security dei prodotti connessi che si chiama Cyber Resilience Act (ovvero CRA).È un passo fondamentale per aumentare la consapevolezza dell’importanza della cyber security in tut
Cybersecurity Resources/BLUETEAM and CTF Skills .md at main · Nickyie/Cybersecurity Resources
Github.com · 2022-09-22 12:34:44 estimated reading time: < 1 min PermalinkGo to file This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.Nickyie Update BLUETEAM and CTF Skills .mdLatest commit 460891c Aug 3, 2022 History1 contributor Users who have contrib
Private email's evolution: From Pretty Good Privacy to wallets Read more
Skiff.com · 2022-09-21 07:06:13 estimated reading time: 4 min How private email has evolved from Pretty Good Privacy (PGP) encryption to built-in key exchange and crypto wallet integrations.Andrew MilichSeptember 18, 2022Sixty years ago, when email was first used to transmit scientific information among collaborators
Euro digitale, tra i partner di Bce arriva Nexi (e a sorpresa anche Amazon)
Ilsole24ore.com · 2022-09-16 23:33:25 estimated reading time: < 1 min di Alessandro Graziani Visco: "Banca d'Italia contribuisce a progetto per Euro digitale"La Banca Centrale Europea (Bce) fa un passo avanti nello sviluppo dell’euro digitale annunciando la scelta di 5 partner tecnici, tra i 54 che si erano candidati,
11 Dark Web Email Service Providers | Tor Anonymous Email 2022
Darkweblinkssites.com · 2022-09-14 10:46:46 estimated reading time: 9 min Over 10 dark web email service providers are listed here. They’re all 100% anonymous, do not store logs and can’t be linked back to you. In some cases, these providers will even strip your IP address (even if it’s a Tor IP) and provide added encryptio
Tornado Sanctions Should Target Bad Actors. Not Technology.
Blog.coinbase.com · 2022-09-12 11:25:25 estimated reading time: 7 min Tl;dr: Coinbase is funding a lawsuit brought by six people challenging the US Treasury Department’s sanctions of the Tornado Cash smart contracts and asking the Court to remove them from the U.S. sanctions list. The lawsuit explains that OFAC exceeded its
crypto.com accidentally sends woman $10 million instead of $100. She went and bought a mansion.
Marketwatch.com · 2022-09-01 21:22:47 estimated reading time: 1 min cryptocurrency exchange crypto.com mistakenly deposited $10.5 million directly into a woman’s bank account when the platform only intended to give her a $100 refund.According to 7news in Australia, a Melbourne woman received the giant payment back in May
Twilio hackers hit over 130 orgs in massive Okta phishing attack
Bleepingcomputer.com · 2022-08-25 20:32:10 estimated reading time: 3 min Hackers responsible for a string of recent cyberattacks, including those on Twilio, MailChimp, and Klaviyo, compromised over 130 organizations in the same phishing campaign.This phishing campaign utilized a phishing kit codenamed '0ktapus' to steal 9,931 lo
The Complete List of Hacker And Cybersecurity Movies
Cybersecurityventures.com · 2022-08-19 15:55:07 estimated reading time: 67 min The Complete List of Hacker And Cybersecurity MoviesPosted at 00:31h in Lists by “Hacker’s Movie Guide” with Foreword by Steve Wozniak, co-founder of AppleSausalito, Calif. – Apr. 7, 2022  | Press Release  |  Book ReviewsThe “Hacker’s Movi
Best Privacy Tools in 2022: Encryption Against Surveillance
Privacytools.io · 2022-08-17 09:03:24 estimated reading time: 54 min Improve the privacy of your friends & family by sharing this websiteFor easy copy & paste on social media platforms, messengers and emails. VPN Privacy Guide: The best and most reliable VPN ServicesWe have compared 185 different VPN providers, but
US Treasury sanctions cryptocurrency mixer Tornado Cash
Theblock.co · 2022-08-13 04:13:29 estimated reading time: 1 min Regulation • August 8, 2022, 10:24AM EDTby Kollen PostThe BlockQuick TakeThe Treasury is sanctioning DeFi mixing service, Tornado Cash. The move is the agency’s second sanction of a mixing service and arguably the first designed to take down a DeFi prot
'Dangerous' precedent: crypto execs slam arrest of suspected Tornado Cash developer
Theblock.co · 2022-08-13 04:03:00 estimated reading time: 2 min DeFi • August 12, 2022, 10:47AM EDTby Kharishar KahfiThe BlockQuick Takecrypto execs said the arrest of a suspected Tornado Cash developer was a threat in a free society and may have “huge consequences” for the industry. crypto industry executives re
Arrested Tornado Cash developer is Alexey Pertsev, his wife confirms
Theblock.co · 2022-08-13 03:58:25 estimated reading time: 1 min The software developer arrested this week over suspected of involvement in the Tornado Cash crypto mixing service is Alexey Pertsev, his wife has told The Block today, confirming earlier speculation on Twitter. Ksenia Malik, who married Pertsev last Septem
Welcome to XC=BASIC 3 [XC=BASIC v3.0]
Xc-basic.net · 2022-08-11 16:49:41 estimated reading time: 1 min Table of Contents Welcome to XC=BASIC 3 Language characteristics About the author Thanks XC=BASIC is a cross compiled, modern BASIC programming language for 8-bit Commodore machines, such as Commodore-64 Commodore VIC-20 Commodore-16 Commodore
Instagram and Facebook can track anything you do on any website in their in app browser · Felix Krause
Krausefx.com · 2022-08-11 00:33:36 estimated reading time: 13 min The iOS Instagram and Facebook app render all third party links and ads within their app using a custom in-app browser. This causes various risks for the user, with the host app being able to track every single interaction with external websites, from all
StegCloak, ovvero steganografia digitale Le Alternative
Lealternative.net · 2022-08-09 23:37:42 estimated reading time: 4 min Segnala errori o suggerisci alternative Segnala errori donazioni Aggiornato il: 8 Agosto, 2022 Indice dei contenuti StegCloak e l’invisibilità Steganografia o magia? Messaggi segreti e nascosti Informazioni su StegCloak Ci piace andare alla scoper
Use Cases and Requirements for Decentralized Identifiers
W3.org · 2022-08-02 09:01:50 estimated reading time: 61 min Use Cases and Requirements for Decentralized Identifiers The need for globally unique identifier schemes has been addressed many times. Globally unique ID schemes typically rely on a central authority controlling a 'root' space that is then delegated to lo
EU Alternatives
Dasprive.be · 2022-07-29 04:44:30 estimated reading time: 11 min Schrems II got you down? Not to worry, Dasprive offers the perfect solution to international transfers: just don’t transfer. “Very funny, yet another privacy absolutist, there simply are no alternatives!” Well, we beg to differ. This page is dedicate
Deloitte: 85% dei commercianti accetterà criptovalute entro 5 anni
Fintastico.com · 2022-07-26 17:18:35 estimated reading time: 8 min Sembra passata un’era da quando le criptovalute erano considerate solamente il passatempo di un gruppo di geeks, senza alcuna rilevanza per il mondo reale. In pochi anni tutto è cambiato. Basta pensare che big del calibro di JPMorgan sono passati dal def
Aegis Authenticator Secure 2FA app for Android
Getaegis.app · 2022-07-23 04:44:58 estimated reading time: 3 min Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services.Meet Aegis AuthenticatorAegis is an alternative to proprietary two factor authentication apps like Google Authenticator
E alla fine, la verita' presenta il conto.
Keinpfusch.net · 2022-07-20 06:31:33 estimated reading time: 5 min Forse pochi di voi sanno cosa sia il modulo SGX della vostra CPU. E forse non sapete che relazione ci sia con il DRM. Quindi forse non sapete cosa stia succedendo in questo momento alle CPU di Intel e di AMD.La storia e' abbastanza lunga. Saprete di preciso
Crollo crypto o il futuro ?
Facebook.com · 2022-07-19 16:59:42 estimated reading time: < 1 min NoticeMelde dich an, um fortzufahren.RegistrierenAnmeldenMessengerFacebook LiteWatchOrteSpieleMarketplaceFacebook PayOculusPortalInstagramBulletinLokalesSpendenaktionenServicesWahl-InformationszentrumGruppenInfoWerbeanzeige erstellenSeite erstellenEntw
Grow Your Own Services
Growyourown.services · 2022-07-14 13:36:49 estimated reading time: < 1 min This is a site encouraging people to make their own independent online services such as social networks, personal clouds, independent websites and more. You don’t need Google, Facebook, Twitter etc in your life, and you don’t need to be rich or a t
Umbrel: Unique Linux Distro for Self Hosting Open Source Software for Your Homelab
Itsfoss.com · 2022-07-14 05:03:22 estimated reading time: 7 min Umbrel is a beautiful operating system as well as a services dashboard that is a good start for someone interested in self-hosting. It has a nice web GUI and enables easy installation of containerized web services with a one-click install. This is perfect
Download latest stable Chromium binaries (64 bit and 32 bit)
Chromium.woolyss.com · 2022-07-13 21:45:35 estimated reading time: 35 min Chromium for 32-bit WindowsReference: Google Chrome 103.0.5060.114 (1002911) • Monday, 4 Jul 2022Portable•Archive•Installer•Package →103.0.5060.114 (1002911) • Monday, 4 Jul 2022 Info: sha1: 004b4fad8f8284b23e59c607565477e524f4f6cb.(virus?) - c
NIST publishes quantum resistant encryption algorithms – Tutanota already uses them in a prototype!
Tutanota.com · 2022-07-08 06:43:09 estimated reading time: 2 min NIST pushes ahead with CRYSTALS-KYBER, CRYSTALS-Dilithium, FALCON, SPHINCS+ algorithms to harden encryption against future attacks from quantum computers. This is a huge step to secure our data as quantum computers will be able to break currently used algor
Recuperato riscatto da ransomware per l'Università dei Paesi Bassi, con gli interessi (in)sicurezza digitale
Insicurezzadigitale.com · 2022-07-05 08:35:36 estimated reading time: 3 min Una curiosa vicenda che vede un attacco ransomware da una cyber gang storica e ben nota anche per Trojan bancari, una vittima dalle grande dimensioni e un pagamento di riscatto. Il resto lo stanno facendo le indagini, che al lato economico hanno già portat
CHM Live | The Great Hack
Invidious.fdn.fr · 2022-07-04 06:01:51 estimated reading time: 2 min CHM Live | The Great Hack - Invidious Watch on YouTube(Embed)Switch Invidious InstanceEmbed LinkShow annotationsDownload as: 132,012936Genre: Science & TechnologyFamily friendly? YesWilson score: 0.9959Engagement: 0.709% Computer History Museum [Record
Lavabit
En.wikipedia.org · 2022-06-20 20:57:46 estimated reading time: 12 min Jump to navigation Jump to search LavabitType of siteWebmailOwnerLavabit LLCCreated byLadar LevisonURLlavabit.comCommercialYesRegistrationRequiredLaunched2004Current statusOnlineContent licenseOpen-source (mail server)Lavabit is an open-source encr
Emotet: come proteggersi al meglio dal trojan
Kaspersky.it · 2022-06-20 17:45:28 estimated reading time: 9 min   Cos'è Emotet? Emotet è un programma malware originariamente sviluppato sotto forma di trojan bancario. L'obiettivo era quello di accedere a dispositivi stranieri e spiare i dati privati sensibili. Emotet ha ingannato i programmi anti-virus di base nasc


foto Valentino Spataro
dal 2008, by Valentino Spataro

Tutti i giorni alle 8.30 ascoltaci sul sito oppure su:

cerca caffe20 on Spreaker caffe20 on Spotify Twitter Alexa caffe20 on Estensione caffe20 on iTunes caffe20 on Google Calendar