Francesco Paolo Micozzi

146 Added | 1 Magazine | 1 Following | 60 Followers | @fpmicozzi | Avvocato. Si occupa di diritto penale, con particolare predilezione per il diritto dell’informatica, delle nuove tecnologie, privacy e diritto d’autore. È autore per LeggiOggi (www.leggioggi.it) e per L'HuffingtonPost e cura il blog Quid Novi (www.micozzi.it). Collabora con le cattedre di Informatica Giuridica e Informatica Giuridica Avanzata dell’Università di Milano ed è fellow dell’Hermes Center for Transparency and Digital Human Rights. Fa parte del comitato esecutivo dell’Istituto per le politiche dell’innovazione ed è relatore in svariati convegni, corsi di formazione e seminari in tema di diritto d’autore, privacy, diritti digitali e reati informatici. Collabora con il mensile Linux Pro (Sprea Ed.) dove tratta argomenti relativi a diritto e software libero. Ha pubblicato, tra gli altri, I nuovi reati informatici (Giappichelli, 2009), di cui è coautore, e l’ebook Il sequestro dei siti internet (Altalex, 2010).

Russian cyberthief convicted of stealing millions of CC info

Roman Seleznev, the son of a Russian parliament member, could face up to 40 years in prison for hacking into point-of-sale computers and stealing millions of credit card details. A federal jury has convicted him of 38 out of 40 counts of wire fraud, intentional damage to a protected computer, …

Dangerous new flaw proves that Macs aren’t as safe as you think

Mac evangelists have often argued that their platform of choice is more secure than Windows PCs, but while that claim was true for many years, the …

Fake "Windows 10 Free Upgrade" emails deliver ransomware - Help Net Security

“It didn’t take long for malware peddlers to take advantage of the huge interest users have shown into Windows 10.<p>The newest version of the popular …

Why You Should Not Use The New Smartphone Fingerprint Readers

Over a year ago I wrote a piece for Forbes that warned of serious security concerns created by the Apple iPhone’s TouchID fingerprint authentication; I speculated then that hackers could gain unauthorized access to users’ data by using lifted fingerprints. Days later, hackers successfully did just …

Information Systems

testing – Join us!

Last May at Maker Faire Bay Area Massimo Banzi introduced our new board to the open source community:<p>The Arduino Zero, developed in collaboration …

President Obama signs cellphone unlocking bill into law

After getting the approval of both the House and the Senate, the US cellphone unlocking bill needed just one more signature to remove the carrier-swapping restriction. Today, President Barack Obama signed the Unlocking Consumer Choice and Wireless Competition Act into law, making it once again …

NIGHTMARE: Man Claims Dropbox Quietly Deleted More Than 8,000 Of His Personal Files

After using the service for about five years, Čurn has come across one of the most terrifying, stomach-churning scenarios one could imagine when relying on cloud storage.<p>More than 8,000 of his personal files had mysteriously disappeared. To be exact, 8,343 of his files were missing.<p>Čurn detailed …

Operating Systems

Block The Pirate Bay Within 3 Days, Austrian ISPs Told

Kino.to, one of Germany’s largest illegal streaming portals, was shut down during 2011 following the largest law enforcement action against of its …

NASA: New "impossible" engine works, could change space travel forever

Until yesterday, every physicist was laughing at this engine and its inventor, Roger Shawyer. It's called the EmDrive and everyone said it was …

Why the Security of USB Is Fundamentally Broken

Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans …

Cryptome pulled OFFLINE due to malware infection: Founder cries foul

<b>Updated</b> Whistle-blowing site Cryptome has been left temporarily unavailable after its service provider NetSol stopped routing traffic towards the …

The Internet's Aswarm In Denial Of Service Attacks And It's Getting Worse

The denial of service attack gets few props for novelty in a field that prizes novelty. In a denial of service (DoS) attack, hackers flood a Web site or application with pointless requests that clog or overwhelm network resources and potentially shut it down. DoS is a cudgel, not a lockpick …

The Hacker News — Online Cyber Security News & Analysis

Oracle has released a security patch update to address a critical remotely exploitable vulnerability that affects its MICROS point-of-sale (POS) …

Google Joins New Coalition to Stop Ad Revenue to Pirate Sites

There is a theory in the entertainment industries that if running torrent, file-sharing or streaming sites makes no commercial sense to their …

ProtonMail: 'NSA-Proof' End-to-End Encrypted Email Service

The Edward Snowden revelations triggered a large-scale movement worldwide towards deploying encryption across the Internet for secure services, which …

Torrentz.eu Domain Suspended After UK Police Request

Over the past few months City of London Police have been working together with copyright holders to topple sites that provide or link to pirated …

Heartbleed Bug Update

Inside Flipboard / April 9, 2014<p>As soon as we found out about the Heartbleed bug, the team here began working on understanding its implications for …

Ruh-roh. Heartbleed affects networking gear from Cisco and Juniper, too

Advertisement<p>3 Comments<p>Credit: Thinkstock<p>The Heartbleed security flaw in OpenSSL encryption that affected popular web and ecommerce sites has also …

What Happens When You Marry The NSA's Surveillance Database With Amazon's Personalized Marketing?

By now, most people who shop online are aware of the way in which companies try to tailor their offers based on your previous purchasing and browsing …

How do I deal with cyber attacks?

Never open unexpected attachments, especially if they contain .pdf or .zip files, says Rick Maybury.<p><i>I have this been subjected to a vicious cyber attack and from nowhere ten or more years of saved documents have been encrypted. I have been offered a release Key in three days time provided I pay</i> …

NSA files decoded: Edward Snowden's surveillance revelations explained | US news | theguardian.com

Snowden leaks: David Cameron urges committee to investigate Guardian

PM says leaks have damaged national security and suggests MPs could 'examine issue and make further recommendations'<p>David Cameron has encouraged a Commons select committee to investigate whether the Guardian has broken the law or damaged national security by publishing secrets leaked by the …

Piracy is Disgusting! No, it's Promotion! Artists Disagree as Links Get Removed

The issue of Internet piracy is certainly a polarizing one, with different camps setting out their stances over whether the practice is generally a …

Scuole: sì alla trasparenza, ma senza violare la privacy

Graduatorie on line e moduli di iscrizione solo con dati pertinenti. No alla pubblicazione sul web dei nomi degli studenti le cui famiglie sono in …

Here's How Apple's Fingerprint Technology Works On The iPhone 5S

The fingerprint system, dubbed Touch ID, will let you unlock your phone by simply placing your finger on the home button.<p>We've broken down how the system works.

Touch ID

Anonymous Hacker 'Kahuna' sentenced to 3 years in prison for hacking Police websites

An Anonymous Hacker and Online hacktivist who was responsible for hacking into the City of Springfield’s website and others Police websites has been …

Take Back the Internet

Government and industry have betrayed the Internet, and us.<p>By subverting the Internet at every level to make it a vast, multi-layered and robust …

Former NSA and CIA director says terrorists love using Gmail

Former NSA and CIA director Michael Hayden stood on the pulpit of a church across from the White House on Sunday and declared Gmail the preferred online service of terrorists. As part of an adult education forum at St. John’s Episcopal Church, Hayden gave a wide ranging speech on "the tension …