The Middle East has always been considered an area of the planet’s turbulent for the continuing conflict and political tensions among the states that inhabit it. In the last two years, the tensions seem to have intensified and with it has grown the diffusion of malware for cyber espionage and for offensive purposes. In the […]
In the first quarter I proposed the results of an analysis conducted by Prolexic firm on the incidence of DDoS attacks. A DDoS attack represents a nightmare for all those all companies that provide web services that could be blocked by similar offensive, let’s imagine the effect of a DDoS against a financial institution or […]
The elaboration of a proper cyber strategy is one the main target of intelligence services all around the world. We often discuss of US and Israel, but also European governments are pushing to reinforce their presence in the cyber space. The fear of cyber attacks against critical infrastructures is high, it is a common strategy […]
In the last decade we have observed the raise of cyber attacks, no matter their purpose, cyber warfare or cyber espionage for military or private business, they have demonstrated how much dangerous is a cyber offensive. The U.S.’s leading cyberwarrior has estimated that private businesses are losing hundreds of billions to cyber espionage and cybercrimes, […]
Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, David Pace The London 2012 Olympics will bring together 10,500 athletes, diplomats, politicians, business leaders and millions of spectators from all over the world. Behind the scenes there is an immense effort being made to ensure the security and well-being of everyone participating, in any […]
Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 06 2012 The article exposes the main issues related to the use of SCADA systems in critical infrastructures, providing a careful analysis of the relative level of security on a global scale. It discusses the main vulnerabilities of critical systems exploitable by cyber […]
It’s been long debated the need to protect critical infrastructures from cyber attacks, cyber threats could hit foreign countries causing loss of human lives identically to a conventional attack. Don’t forget that similar attacks con be organized by state-sponsored hackers or cyber criminals with the different purposes, target destroying or cyber espionage. Emergency Response Teams […]
On June 28th, a FBI official declared before a House panel that the phenomenon of cyber espionage is increasing with an alarming trend. We are living a period of great crisis and the intellectual property is becoming a privileged target for cyber attacks. It has been estimated that the economic espionage in the current fiscal […]
Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used in Tibet against Uyghur hacktivists, a Turkic ethnic group living in Eastern and Central Asia. The instance of Tibet malware detected infects OS X machines and is spread following a consolidated schema for politically motivated […]
Last Christmas the Stratfor Global Intelligence was hacked by Anonymous who disclosed company website and also the full client list of over 4000 individuals and corporations. The hacker gained access to a subscriber list stored on stratfor.com, and that list contained unencrypted credit card data. Stratfor is an organization that gathers open source intelligence which […]