Cyber Crime

Pierluigi Paganini September 05, 2012
Large-scale monitoring, few hours to identify file-sharers

We have often discussed the fact that governments and intelligence agencies regularly use tools to spy on communications and navigation data of millions internet users. The market monitoring is a thriving market, where revenue opportunities are high and where demand is far outstripping supply. Malware, backdoors, appliances are just some of the solutions used to […]

Pierluigi Paganini September 04, 2012
AntiSec steals 1M Apple UDID from FBI notebook with an exploit

Another blow was dealt to the authorities by a group of hackers linked to Anonymous that claims to have breached FBI security posting 1 million Apple Unique Device Identifiers (UDIDs). The UDIDs are the string of numbers that uniquely identifies each Apple device, and AntiSec hacker group has announced to have leaked more than 12 […]

Pierluigi Paganini September 03, 2012
Social Networks Part 3 – Are you exposing yourself unnecessarily to physical threats?

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our first article we talked about the intentional or unintentional disclosure of personal information in social networks that can expose you to logical (computer-based) threats and we gave you some recommendations about how to properly manage this risk of […]

Pierluigi Paganini August 23, 2012
Crisis malware threatens the virtualized environments

This is an hot summer under the malware perspective, we have spoken of new malware for cyber espionage and of new fraud schemas based on malicious software diffusion. Many experts use to avoid malware diffusion making risky navigation and operations in a Virtual environment, a paradigm that is having a great diffusion in the last […]

Pierluigi Paganini August 22, 2012
New raise of Citadel malware…banking again under attack

The FBI has launched an alert titled “Citadel Malware Continues to Deliver Reveton Ransomware in Attempts to Extort Money “ One of the sectors most targeted by cyber attacks and by malware is the banking, during the last months we have read several times of agents developed to steal credentials of accounts and to realize complex frauds. […]

Pierluigi Paganini August 17, 2012
Botnet around us, are we nodes of the Matrix?

Article Published on The Hacker New Magazine – August Edition “Botnet” Introduction The nightmare of millions of infected computers synchronized to conduct an attack on specific target finds materialization in the concept of botnet. In the classic architecture each machine, named bot, executes orders sent by a master unit called bootmaster, which can instruct the various […]

Pierluigi Paganini August 09, 2012
Traveling the Silk Road, study of the famous market places

Yes Guys, when we think to the deep web the media tell us only about its dark side, it’s considered the paradise of cybercrime, the reign of the theft, a place to escape, but is it true? The governments want you to ay far from the hidden web, because they cannot spy on you, the […]

Pierluigi Paganini August 08, 2012
Anonymous Ethical code. Back to the origins

Several months ago I wrote on the future of the famous group of hacktivism, Anonymous explaining that the model the originated the movements was evolving in unpredictable way due the large consensus of the hackers and possible infiltration made by law enforcement and governments. According recent revelation inside the group there are two principal faction, […]

Pierluigi Paganini August 06, 2012
Phishing the financial and banking seas

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martins, David Pace and Benjamin Gittins Every day the international SWIFT banking network processes financial transactions (relayed between banks) valued at literally trillions of dollars. Today, most of the >1 billion personal computers connected to the Internet are now at least occasionally involved in e-banking, […]

Pierluigi Paganini August 02, 2012
Malware & cyber espionage, ongoing attacks on sensitive information

Malware once were used primarily to destroy the victim’s PC, but the scenario has completely changed today. While surviving the need of wanting to harm with malicious software, for example in the development of cyber weapons, the current trend is to develop agents that serve primarily to the function of spying. Cybercrime, governments, and groups […]