Cyber Crime

Pierluigi Paganini September 25, 2012
Expected new wave of cyber attacks against banking

In these days it has been discussed about a possible Iranian cyber offensive against US banks immediately denied by government of Teheran, the event raised the discussion on the real level of security of banking systems. Financial institutions are considerable privileged targets for a cyber attacks, banking system is a critical asset for a nation […]

Pierluigi Paganini September 23, 2012
Eset on Flashback malware, interesting info to prevent further attacks

Reports from main security firms confirm the increasing growth of cyber attacks based on malware, in particular the large diffusion of Apple products has made them desirable targets. The explosion of malicious agents designed for Apple OS X operating system as surprised Apple users that have found themselves suddenly vulnerable exactly such as users of […]

Pierluigi Paganini September 17, 2012
The good and the bad of the Deep Web

  Article Published on The Hacker New Magazine – September Edition “Security in a serious way” Introduction The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines, according a raw estimation of some security experts clear web represents only a small portion of the […]

Pierluigi Paganini September 16, 2012
Microsoft distrupts Nitol botnet, malware hidden in supply chain

The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or with a cyber scam, malicious agents are around us, they have infected a huge quantity of machines with dramatic consequences. But what’s happen if we discover the malware inside the controller of ordinary object that […]

Pierluigi Paganini September 14, 2012
Botnet, pro & cons of using Tor Networks

As declared several time Deep Web, thanks to the anonymity of its connection, provides to cyber criminals an ideal environment to grow up profitable business. We have mainly discussed of deep web such as a portion of cyber space mainly used to sell any kind of good, from malware agent to drugs and other criminal […]

Pierluigi Paganini September 13, 2012
Cybercrime evolution in North America and Western Europe

Despite cyber space is known as a domain without border an interesting study of the Kaspersky Security firm demonstrates that cyber criminal activities are mainly located in some area of the planet, as we can see also the victims of the attacks have a geographical features that make them attractive targets. Factors such as the […]

Pierluigi Paganini September 11, 2012
All you have to know on DDoS attack against GoDaddy

Yesterday was a terrible day, late afternoon in Europe Time, I noted that my blog Security Affairs, was down. I received several messages from my readers but when I tried to investigate on the reasons I discovered, with a great surprise, that the entire GoDaddy Platform was down. The popular web host supports more than […]

Pierluigi Paganini September 07, 2012
Dangerous waves of malware are transforming cyberspace in a jungle

The cyberspace is becoming a jungle of malware, a place where the danger is just around the corner. Governments, cyber criminals, hacktivist and terrorist are focusing their activities in the new domain due this reason we are assisting to the born of new agents and very sophisticated attack tools. In a parallel manner is lowering […]

Pierluigi Paganini September 06, 2012
2012 Norton Cybercrime report, a worrying scenario

Here we are with the regular appointment with Symantec and its report on cybercrime ” The yearly Norton Cybercrime report“, a document that analyzes the evolution of  cyber criminal activities and their impact on the society. The report covers different technologies including and social networking and mobile reporting the impact on final customers in economic terms. […]

Pierluigi Paganini September 05, 2012
Large-scale monitoring, few hours to identify file-sharers

We have often discussed the fact that governments and intelligence agencies regularly use tools to spy on communications and navigation data of millions internet users. The market monitoring is a thriving market, where revenue opportunities are high and where demand is far outstripping supply. Malware, backdoors, appliances are just some of the solutions used to […]