Cyber Crime

Pierluigi Paganini April 20, 2012
Cyber threats in mobile environment

Today I desire to share with you the results of a study of Trend Micro security firm focused on mobile threat incidents related to the first quarter of 2012. The large diffusion of mobile devices and the leak of awareness on the principal cyber threats have produced an increasing interest of the cybercrimein mobility sector, […]

Pierluigi Paganini April 17, 2012
Iran, 3M bank accounts hacked.Hypothesis on cyber warfare scenario

The story that I desire to report seems the plot of a movie, Khosrow Zarefarid an Iranian software manager after finding security vulnerability in Iran’s banking system tried to inform the management of the affected banks preparing a detailed report. As usually the bank’s manager ignored the alert so the Iranian expert decided to demonstrate the […]

Pierluigi Paganini April 16, 2012
DDoS, detailed analysis of the phenomenon

Last year we have observer an impressive grow of distributed denial-of-service (DDoS) attacks mainly related to operation arranged by group of hacktivists such as Anonymous. During a DDoS attacks multitude of compromised systems attack a single target causing denial of service for users of the targeted system. I desire to analyze with you the interesting results […]

Pierluigi Paganini April 15, 2012
Anonymous,from OpTrialAtHome to the streets,is time for changing

Another Saturday, another round, as announced today the group Anonymous has targeted government sites to protest against British government policy. Nothing new over last week, same goals, same mode of attack, the same result. On internet bounced messages of joy for having staged the second act of the operation called by the group #OpTrialAtHome.   Let’s start making some reflections on the real utility of these […]

Pierluigi Paganini April 13, 2012
Botnets and cyber warfare, a dangerous combination

The US Government is very close to the theme of warfare being among the countries that invest more in the field. In a cyber security context we can enumerate a huge quantity of cyber threats that daily are designed and enhanced, a heterogeneous world and that includes many different options that could harm military and […]

Pierluigi Paganini April 11, 2012
Medicaid incident. How much cost a data breach?

The Utah Department of Technology Services (DTS) has announced that the Utah Department of Health (UDOH) was victim of an hack. On Monday the server that hosts Medicaid was hacked, the news of the breach has been published on Wednesday. In a first time the entity of the data breach has been estimated in 181,604 […]

Pierluigi Paganini April 09, 2012
Synaptic Labs’ Annual Reports on the Global Cyber Safety and Security Status, Technical Problems, Drivers and Incentives (2012)

It is clear that there is an unrelenting increase in cyber attacks.  Indeed, the media at large is now bombarding the community with a stream of isolated security incidents, one after the other, leaving most of us on “main street” feeling paralyzed and wondering:  Is this just sensationalism?  How bad is the situation really?   Those of us who […]

Pierluigi Paganini April 08, 2012
Anonymous attacks the UK government.OpTrialAtHome, Tango Down

As announced during last days Anonymous has launched a Distributed Denial of Service (DDoS) against several UK government websites. A massive recruiting campaign is started on social media, a call to arm to protest the extradition of U.K. citizens to the United States. The Operation named “Operation Trial At Home,” fight the European Arrest Warrant (EAW) that could […]

Pierluigi Paganini April 06, 2012
Cyber terrorism, cyber attacks against al Qaeda 2.0

The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we tend to associate a terrorist act to a physical event as an explosion, a conflict, a tragedy, but the common people totally ignore the potential threat of a cyber offensive. We learned about the devastating […]

Pierluigi Paganini April 05, 2012
Anonymous, its strategy against censorship and the diversionary theory

Groups of hacktivist like Anonymous are the actual news of the global technology landscape, a new force with which and against which confront. As repeatedly stressed I consider the moment of confrontation with the group a moment of growth for the IT professional in many ways, on all: having to deal with the cyber threat that […]