Groups of hacktivist like Anonymous are the actual news of the global technology landscape, a new force with which and against which confront. As repeatedly stressed I consider the moment of confrontation with the group a moment of growth for the IT professional in many ways, on all: having to deal with the cyber threat that […]
Recently ESET security firm has reported the latest version of the Blackhole exploit kit that has been updated to include a new exploit for the Java CVE-2012-0507 vulnerability. The exploit was discovered for the first time on 7.03.2012 and it first detections were dated on March 12, 2012 and today a public module for Metasploit […]
The day is come, yesterday morning as planned Global Payments Inc., the Atlanta-based credit and debit card processor that recently announced a breach that exposed fewer than 1.5 million card accounts, held a conference call to discuss about the breach and its impacts. Again Krebson Security Blog is the more accredited source in my opinion, they […]
The Krebs on Security blog reported that there has been a security breach at Global Payments that “may involve more than 10 million compromised card numbers.” We are facing with a massive breach that could impact more over 10 million compromised card numbers, for this reason VISA and MasterCard are alerting banks across US about […]
Hi all, I write a few hours before the fateful D-Day, March 31th … What happens tomorrow when I wake up? For sure I will breakfast, tomorrow I’ll not work so after breakfast turning on my PC will I be able to navigate on internet? What was the outcome of the Operation Blackout? I am the […]
The news that I wish discuss was published on the website of Forbes magazine, titled “Shopping For Zero-Days: A Price List For Hackers’ Secret Software Exploits“, that focuses on the commercial value of the vulnerability of popular applications. Time ago the figure of the hacker was recognized mainly as a researcher interested to measures its skills […]
Just yesterday I completed a lengthy article regarding several aspects of cybercrime and their impact on private and military sectors. In a section of the article describing among other factors the impact of the phenomenon hacktivism far from negligible. According the study “Data Breach Investigations Report” published by Verizon hacktivists stole almost twice as many records of […]
It has repeatedly reiterated the need for a cyber strategy to reduce risks related to cyber threats from various sources, military, cyber crime or hacktivism. Cyber threats expose our intelligence agencies, our critical infrastructures and our companies to significant risks causing untold perfidious finance. In the area of cyber warfare governments have made considerable strides, gained awareness of the […]
In this first couple of months of 2012 we have assisted to an escalation of cyber attacks made by groups of hacktivist, first Anonymous, that have hit main institutions and agencies all over the world. The modus operandi of the group is now well known, attacks that have crippled many victims were mainly of DDoS type, in this way […]
The continued technology push that is shaping our society during the last decade has brought an exponential increase in computer crimes, every technology innovation has in fact represented an opportunity for industry of crimeto make profitable frauds and business. The cyber crime has many facets, cybercrime fact manifests itself in countless forms and contextualized in relation […]