Hacking

Pierluigi Paganini June 04, 2012
In the shadow of the Flame, Warner Bros, China Telecom & US Navy hacks

What’s happening while the world’s attention is on Flame malware? The cyberspace is a very turbulent place where groups of hackers daily attack governments and private industries. Governments, hacktivist, cybercrime opposing forces facing each other on the same board, a game of chess where the outcome is unpredictable and no shortage of twists. Stuxnet, Flame […]

Pierluigi Paganini June 04, 2012
The hacktivism phenomenon

Article published on The Malta Indipendent The last years have been characterised by the escalation of operations conducted by hacktivist groups, such as the famous Anonymous, which have expressed social dissent through cyber attacks. In contemporary society technology plays a crucial role, and is used as a new cultural vehicle and even aggregation element. It’s a […]

Pierluigi Paganini June 01, 2012
Wake up Anonymous, the world is getting used to you!

What is happening to Anonymous? His media energy seems to be at risk addiction just when major security firm are beginning to consider it as one of the most dangerous cyber threat. The feeling that comes from outside is that the group of hacktivist is slowly falling apart, the feeling is that within the group are mixed stirring souls. Some groups are more aware on […]

Pierluigi Paganini May 26, 2012
DDoS attack against 123-reg, the Chinese paranoia

The UK’s companies 123-reg, the biggest domain provider,  was hit this week by a “massive” DDoS attack that caused interruption of the services provided. The company hosts three million domain names and more than 1.4 million sites. According a press published on the company web site, later removed, the attack came from a Chinese source […]

Pierluigi Paganini May 24, 2012
What is the Deep Web? A first trip into the abyss

  The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines. According several researches the principal search engines index only a small portion of the overall web content, the remaining part is unknown to the majority of web users. What do you […]

Pierluigi Paganini May 23, 2012
Iranian hackers against NASA,isolated attack or cyber warfare act?

Exactly on week ago a group of Iranian hackers named Cyber Warriors Team claimed to have compromised an SSL certificate issued to the Research and Education Support Services of NASA.  The press released by the Cyber Warriors Team said that hackers have written an HTTPS protocol scanner to find weaknesses in the NASA website.  A […]

Pierluigi Paganini May 22, 2012
LinkedIN – Vulnerability in the authentication process and related risks

A serious vulnerability has been found in the authentication process of the popular network LinkedIN, the news published on the Spanish blog of the security expert Fernando A. Lagos Berardi. The article published reports that a vulnerability in LinkedIn allows obtaining user’s password. For the authentication process LinkedIn adopts a token in login phase that can […]

Pierluigi Paganini May 22, 2012
Who is attacking WikiLeaks and The Pirate Bay? The private revenge

Who is attacking WikiLeaks and The Pirate Bay? WikiLeaks and BitTorrent file-sharing site Pirate Bay were hit by a series of DDoS attacks during last weeks. An alleged hacker with the Twitter account @AnonNyre has taken credit for the attacks claiming to be member of Anonymous.The hacker also said that he is no more part of […]

Pierluigi Paganini May 19, 2012
Concerns for Chinese firms and the cyberespionage

We often discuss about warfare and cyberespionage, focusing on the usage of technology to steal intellectual property of foreign states. Of course the countries that have valuable technology skills are most exposed to targeted attacks that daily try to steal information regarding hi tech projects. Japan, US and European Countries are preferred target of many […]

Pierluigi Paganini May 16, 2012
Has Anonymous infiltrated US Government? The insider issue

In last months we have a long discussed about the security status of US networks and infrastructures, we have described the American cyber strategies and the main action proposed to protect the principal assets of the nations. One story in particular struck us deeply, that relating to the vulnerability of U.S. Government networks for admission […]