Cyber Crime

Pierluigi Paganini September 07, 2012
Dangerous waves of malware are transforming cyberspace in a jungle

The cyberspace is becoming a jungle of malware, a place where the danger is just around the corner. Governments, cyber criminals, hacktivist and terrorist are focusing their activities in the new domain due this reason we are assisting to the born of new agents and very sophisticated attack tools. In a parallel manner is lowering […]

Pierluigi Paganini September 06, 2012
2012 Norton Cybercrime report, a worrying scenario

Here we are with the regular appointment with Symantec and its report on cybercrime ” The yearly Norton Cybercrime report“, a document that analyzes the evolution of  cyber criminal activities and their impact on the society. The report covers different technologies including and social networking and mobile reporting the impact on final customers in economic terms. […]

Pierluigi Paganini September 05, 2012
Large-scale monitoring, few hours to identify file-sharers

We have often discussed the fact that governments and intelligence agencies regularly use tools to spy on communications and navigation data of millions internet users. The market monitoring is a thriving market, where revenue opportunities are high and where demand is far outstripping supply. Malware, backdoors, appliances are just some of the solutions used to […]

Pierluigi Paganini September 04, 2012
AntiSec steals 1M Apple UDID from FBI notebook with an exploit

Another blow was dealt to the authorities by a group of hackers linked to Anonymous that claims to have breached FBI security posting 1 million Apple Unique Device Identifiers (UDIDs). The UDIDs are the string of numbers that uniquely identifies each Apple device, and AntiSec hacker group has announced to have leaked more than 12 […]

Pierluigi Paganini September 03, 2012
Social Networks Part 3 – Are you exposing yourself unnecessarily to physical threats?

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our first article we talked about the intentional or unintentional disclosure of personal information in social networks that can expose you to logical (computer-based) threats and we gave you some recommendations about how to properly manage this risk of […]

Pierluigi Paganini August 23, 2012
Crisis malware threatens the virtualized environments

This is an hot summer under the malware perspective, we have spoken of new malware for cyber espionage and of new fraud schemas based on malicious software diffusion. Many experts use to avoid malware diffusion making risky navigation and operations in a Virtual environment, a paradigm that is having a great diffusion in the last […]

Pierluigi Paganini August 22, 2012
New raise of Citadel malware…banking again under attack

The FBI has launched an alert titled “Citadel Malware Continues to Deliver Reveton Ransomware in Attempts to Extort Money “ One of the sectors most targeted by cyber attacks and by malware is the banking, during the last months we have read several times of agents developed to steal credentials of accounts and to realize complex frauds. […]

Pierluigi Paganini August 17, 2012
Botnet around us, are we nodes of the Matrix?

Article Published on The Hacker New Magazine – August Edition “Botnet” Introduction The nightmare of millions of infected computers synchronized to conduct an attack on specific target finds materialization in the concept of botnet. In the classic architecture each machine, named bot, executes orders sent by a master unit called bootmaster, which can instruct the various […]

Pierluigi Paganini August 09, 2012
Traveling the Silk Road, study of the famous market places

Yes Guys, when we think to the deep web the media tell us only about its dark side, it’s considered the paradise of cybercrime, the reign of the theft, a place to escape, but is it true? The governments want you to ay far from the hidden web, because they cannot spy on you, the […]

Pierluigi Paganini August 08, 2012
Anonymous Ethical code. Back to the origins

Several months ago I wrote on the future of the famous group of hacktivism, Anonymous explaining that the model the originated the movements was evolving in unpredictable way due the large consensus of the hackers and possible infiltration made by law enforcement and governments. According recent revelation inside the group there are two principal faction, […]