Evolution Of Password Management - Introduction

In the past, I've written about various ways your passwords can be stolen or guessed in the series called 3 Ways To Open A Lock (part 1, part 2 and part 3). I've also provided some hints to make your passwords more secure and warned about possible ri… (read more)


Eventually, last week I've obtained a free email account to try this service. If you've never heard about it, it's an email provider based in Switzerland that claims to be immune from eavesdropping. ProtonMail offers 500 MB of space for your mailbox,… (read more)

DMail And The False Sense Of Security

Email is around since several decades. Nevertheless, it is still one of the most used form of communication, especially in business. Therefore the security of an email message is really important. Over the years, different methods have been implemen… (read more)

Cookies And The Law

On June the 2nd, a new Italian law about cookies took effect. Basically it imposes: to notify the user about the usage of so called technical cookies, and to ask the permission to use profiling cookies (and blocking them until this permission is acco… (read more)

3 Ways To Open A Lock - Part 3

This is the third and last part of a series (first post, second post). Simply Asking For The Key Although in the real life it's unlikely that a thief asks you for the key of your home, in the digital world this is the most common and successful type… (read more)

3 Ways To Open A Lock - Part 2

In the previous post, I've talked about guessing your password. Now I'm gonna cover another case. Stealing Your Key Now you have a super secure password and you feel calm and safe, right? But thieves are in ambush. Whenever you use your password in a… (read more)

The Worst Problems Of IoT

Security and privacy. Well, this post could have ended here, but since I'm a bit talkative (just a bit), I'll try to argument. First of all, Internet of Thing [...] is the network of physical objects or "things" embedded with electronics, software,… (read more)