Stiamo tostando un nuovo caffe' !




I link a disposizione dei "caffeinomani" per approfondire alla fonte. Vuoi collaborare ?

Open Source software and installed list
Nomagic.uk · 2021-09-15 09:30:58 estimated reading time: 13 min The web applications and the catalogue of services might be subject to changes, depending on how the different projects evolve. The services are mostly provided ‘as is’, with little to no differences at all from the original project. We are not involv
Carte di identità e Patenti di guida sbarcano sugli iPhone negli Usa
It.mashable.com · 2021-09-15 05:58:09 estimated reading time: 2 min Una svolta storica per la dematerializzazione dei documenti. Apple ha annunciato i primi stati degli Stati Uniti che supporteranno la nuova funzione di iOS 15 che memorizza le patenti di guida e le Carte di Identità nell'app Wallet.Si tratta di Arizona e G
Consigli sulla Prevenzione | The No More Ransom Project
Nomoreransom.org · 2021-09-13 12:31:16 estimated reading time: < 1 min Le infezioni da Ransomware si verificano in diversi modi, ad esempio attraverso siti web insicuri e fraudolenti, download di software e allegati malevoli. Chiunque può essere un bersaglio - individui e aziende di tutte le dimensioni.Fortunatamente, ci
Future Series: Cybersecurity, emerging technology and systemic risk
Weforum.org · 2021-09-13 12:20:15 estimated reading time: 7 min This new Future Series report highlights the growing threat from hidden and systemic risks inherent in the emerging technology environment, which will require significant change to the international and security communities’
GitHub ray lothian/Block Site: A browser extension to block website access using hostname matching
Github.com · 2021-09-13 09:02:11 estimated reading time: < 1 min {{ message }} FilesPermalinkFailed to load latest commit information.A browser extension to block website access using hostname matching and moreYouTube PreviewLinksHomepage: https://add0n.com/block-site.html Chrome: https://chrome.google.com/webstore/
Guerre di Rete SPYWARE LTD (PARTE 3)
Guerredirete.substack.com · 2021-09-12 16:38:36 estimated reading time: 22 min Edizione speciale della newsletter con un lungo approfondimento a tema trojan di Stato. PARTE TERZA PARTE TERZA La prima e seconda parte si trovano nelle due newsletter precedenti. Con questa si conclude lo speciale. L’intero Spyware Ltd si può anche le
Guerre di Rete SPYWARE LTD (PARTE 2)
Guerredirete.substack.com · 2021-09-12 16:37:47 estimated reading time: 30 min Edizione speciale della newsletter con un lungo approfondimento a tema trojan di Stato (SECONDA PARTE) SECONDA PARTE (La prima parte, con l’indice, si trova nella precedente newsletter. La terza e ultima parte si trova nella newsletter seguente. L’inte
Guerre di Rete SPYWARE LTD (PARTE 1)
Guerredirete.substack.com · 2021-09-12 16:36:31 estimated reading time: 26 min Edizione speciale della newsletter con un lungo approfondimento in 3 parti sul tema trojan di Stato. - PARTE 1 Copertina: “Misteri” (dettaglio), tecnica mista di Cristiano Baricelli apparso su «Digressioni»,  qui ripubblicato su gentile concession
Open Hub, the open source network
Openhub.net · 2021-09-09 16:43:29 estimated reading time: < 1 min Discover, Track and Compare Open SourceJoin Now Join NowWhat's NewMost Popular ProjectsMozilla Firefox13503 usersApache HTTP Server9694 usersMySQL9445 usersApache Subversion8521 usersPHP7984 usersLinux Kernel7557 usersBash6727 usersFirebug59
Smart cars (vetture intelligenti)
Gpdp.it · 2021-09-07 12:12:26 estimated reading time: < 1 min LINEE GUIDA DEL COMITATO EUROPEOPER LA PROTEZIONE DEI DATI (EDPB)EDPB - Linee Guida 1/2020 on processing personaldata in the context of connected vehiclesand mobility related applicationsAdottate il 9 marzo 2021- ENISA - Good practices for
Auto connesse, chi le attacca e come?
Repubblica.it · 2021-09-07 10:37:57 estimated reading time: 5 min Le auto connesse sono tra noi, concentrati di tecnologia concepiti per offrire esperienze di guida impensabili fino a qualche anno fa il tutto garantendo elevati livelli di sicurezza. Il rovescio della medaglia è che proprio la connessione di questi dispos
Nicola Vanin on LinkedIn: #auto #security #Tesla | 16 comments
Linkedin.com · 2021-09-07 10:31:08 estimated reading time: < 1 min We and third parties such as our customers, partners, and service providers use cookies and similar technologies ("cookies") to provide and secure our Services, to understand and improve their performance, and to serve relevant ads (including job ads)
Upstream security's 2021 Global Automotive Cybersecurity Report
Upstream.auto · 2021-09-07 10:25:23 estimated reading time: 1 min Research Into Cyber Attack Trends In Light Of Cybersecurity Standards And Regulations2020 has been a year of disruption in the automotive industry, both because of COVID-19 and the new automotive cybers
The open source email service Tutanota fights for your right to privacy.
Tutanota.com · 2021-09-04 06:55:38 estimated reading time: 9 min All Tutanota apps are Libre software to provide an open source email alternative to Gmail, Yahoo, GMX and others. To us this includes to publish our Android app on F-Droid. Unlike other secure email services, Tutanota does not use closed third party code -
Cloud Monitoring as a Service | Datadog
Datadoghq.com · 2021-09-03 19:22:55 estimated reading time: < 1 min read our reportThe State of ServerlessOur latest research examines millions of functions to understand how serverless is being used in the real world.READ MORE >CareersJoin Our TeamWe are building the monitoring and security<
PDF
Ec.europa.eu · 2021-08-31 23:35:56 estimated reading time: 24 min eHealth Network G uidelines on Value Sets for Digital Green Certificates Version 1.0 2021 -0 4-21 eHealth Network 2 The eHealth Network is a voluntary network, set up under article 14 of Directive 2011/24/EU.
22 Best Open Source Apps for Android (2021)
Techrrival.com · 2021-08-30 15:25:15 estimated reading time: 10 min As you already know, Android is an open-source platform. This gives the freedom to smartphone manufacturers to shape it the way they want. Just like the numerous Android variants, there are many open-source Android apps available out there. These apps may
After Data Is Posted On Conspiracy Site, Colorado County's Voting Machines Are Banned
Npr.org · 2021-08-30 00:37:39 estimated reading time: 5 min Enlarge this image Colorado Secretary of State Jena Griswold speaks at a press conference about investigation into the Mesa County election breach, on Thursday in Denver. RJ Sangosti/MediaNews Group/Denver Post via Getty Images RJ Sangosti/MediaNews
Device security guidance
Ncsc.gov.uk · 2021-08-28 00:15:19 estimated reading time: < 1 min wallabag can't retrieve contents for this article. Please troubleshoot this issue.
The Rise Of User Hostile Software
Den.dev · 2021-08-26 23:42:10 estimated reading time: 8 min We need to talk about the state of modern software. Yes, those pieces of .exe, .dmg or .deb binaries that come with almost every device and service out there (or maybe they even come with or for your phone). I’ve been contemplating writing this for some t
Prezzi Mailchimp cosa cambia
Maura.it · 2021-08-26 20:19:06 estimated reading time: 5 min Nella mia guida Mailchimp aggiornata, avevo già dato notizia del cambiamento da Liste ad Audience eseguito di recente dalla piattaforma email marketing e automation. Con oggi arrivano grandi novità anche per i piani a pagamento e gratuiti che, come è
A decade and a half of instability: The history of Google messaging apps
Arstechnica.com · 2021-08-26 10:37:16 estimated reading time: 132 min Enlarge Google Talk, Google's first-ever instant messaging platform, launched on August 24, 2005. This company has been in the messaging business for 16 years, meaning Google has been making messaging clients for longer than some of its rivals have exist
A custom ROM to liberate the heart of Kai
Gerda.tech · 2021-08-24 13:26:03 estimated reading time: 6 min GerdaOS: a custom ROM to liberate the heart of Kai # ![GerdaOS](icon.png) Welcome to the home page of world's first custom ROM for Nokia 8110 4G and (in the future) other KaiOS based phones that aims for users' privacy, security
I spent a week with a $17 KaiOS phone here's what I learned
Androidauthority.com · 2021-08-24 09:09:27 estimated reading time: 12 min Hadlee Simons Opinion Post KaiOS has quietly become a global powerhouse in the mobile industry, bridging the gap between feature phones and smartphones. The so-called smart feature platform is designed for phones with a physical keypad and more modest sp
How AI powered tech landed man in jail with scant evidence Tracked ... gli abusi e gli impieghi "discutibili" dell'intelligenza artificiale.
Apnews.com · 2021-08-20 12:10:47 estimated reading time: 20 min CHICAGO (AP) — Michael Williams’ wife pleaded with him to remember their fishing trips with the grandchildren, how he used to braid her hair, anything to jar him back to his world outside the concrete walls of Cook County Jail. His three daily calls to
Mind your fingerprint! ERMES cyber security
Ermes.company · 2021-08-16 22:10:32 estimated reading time: 4 min Most websites you run across while browsing the Web include content which tracks your online activity. This practice has multiple goals: advertising is the most common, with tracking companies generating digital profiles based on users’ interests t
TikTok to add more privacy protections for teenaged users, limit push notifications – TechCrunch
Techcrunch.com · 2021-08-12 20:35:40 estimated reading time: 5 min TikTok today becomes the latest tech company to roll out increased protections for min ors on its platform in the wake of increased regulatory scrutiny. The company says it will introduce a series of product changes for teen users aged 13 to 17, aimed at ma
Object storage
En.wikipedia.org · 2021-08-11 12:47:02 estimated reading time: 19 min Jump to navigation Jump to search Object storage (also known as object-based storage[1]) is a computer data storage architecture that manages data as objects, as opposed to other storage architectures like file systems which manages data as a file hier
Lazio recupera dati con backup su VTL. La ricostruzione di Giustozzi
Cybersecitalia.it · 2021-08-07 12:30:06 estimated reading time: 3 min L’esperto di sicurezza cibernetica spiega a Cybersecurity Italia come è stato possibile, tecnicamente, questo “miracolo”. I dati di circa 6 milioni di cittadini del Lazio sono stati recuperati grazie al backup sulla Vi

Come ascoltarci

Puoi ascoltare il Caffè cliccando su "play" oppure:
cerca caffe20 on Spreaker caffe20 on Spotify Twitter Alexa caffe20 on Estensione caffe20 on iTunes caffe20 on Google Calendar
Ascolta dal lunedì alla domenica, alle 8.30, news e attrezzi di lavoro.