Trend Micro published a very interesting report on the Russian underground market, the document written by Max Goncharov analyzed the services and the products marketed by cyber criminals. The study is based on data obtained from the analysis of online forums and services attended by Russian hackers such as antichat.ru, xeka.ru, and carding-cc.com. Trend Micro […]
The numerous attacks and data breaches occurred during the last 12 months demonstrated that despite high attentions in security the principal causes of the incidents are leak of authentication processes, absence of input validation on principal applications and of course the human factor is among the main accused. Last year different data breaches exposed millions […]
Last week I discussed with a friend on the risks related to attacks of the group Anonymous against strategic offices in Italy. In that occasion I didn’t excluded offensives of the group of hacktivists against institutions of my country predicting them in conjunction with the upcoming elections or financial maneuvers. Anonymous group in Italy appears […]
Trend Micro has released the report “3Q 2012 SECURITY ROUNDUP -Android Under Siege: Popularity Comes at a Price” that presents a worrying trend for malware growth increased of 483%. The increment include cyber espionage malware and also destructive malicious agents targeting mainly the mobile world and in particular Google Android platform. Malware targeting Android platform increased […]
After much work during the last months I’m proud and happpy to announce the publishing of The Deep Dark Web book. It is AVAILABLE @Amazon website  http://www.amazon.com/The-Deep-Dark-Web-hidden/dp/1480177598 PAPER BOOK It is AVAILABLE @Amazon website  http://www.amazon.com/dp/B009VN40DU KINDLE It is AVAILABLE @SmashWords website  http://www.smashwords.com/books/view/247146 It is AVAILABLE @Barnes & Noble website    http://www.barnesandnoble.com/w/the-deep-dark-web-pierluigi-paganini/1113594408?ean=2940015852837 and we have uploaded it also to Amazon […]
Recent revelations on Flame case raise the question on the efficiency of âzero day vulnerabilities“, software bugs that hackers exploit to avoid security defenses of target systems. The real problem when we talk about zero-day is related to the duration of the period in which hackers exploit the vulnerability before world wide security community respond […]
Hacktivism is considered one of the most interesting phenomena of the last year, despite this form of dissent is dated in the last years it has catalyzed the media attention with its exploit. Hacktivism is considered one of the main cyber threats and its operations have created serious problems to private businesses and governments, for […]
Every day we read about cyber threats, zero day vulnerabilities and new patch to apply so I decided to speak about a couple of vulnerabilities I believe potential dangerous for internet users. There is no peace for browsers, this category of application is considered a privileged target for hackers due their large diffusion. Once again […]
Article published on The Malta Indipendent on October 7th 2012 Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins Bank (in)Security:   Between the 1880s and the 1930s, physical bank burglaries were a substantial problem.  To counter these threats bank’s employed vaults to protect their contents from theft, unauthorised use, fire, natural disasters, and other […]
At the American Enterprise Institute (AEI) event “Cybersecurity and American power,” Gen. K.B. Alexander, director of the National Security Agency (NSA) and chief at the Central Security Service (CSS), defined cybercrime “the greatest transfer of wealth in history.” alerting Government on the emergency related to intellectual property theft due cyber espionage. “Symantec placed the cost of […]