Hacking

Pierluigi Paganini October 17, 2012
Tens of zero day vulnerabilities, millions of users exposed

Every day we read about cyber threats, zero day vulnerabilities and new patch to apply so I decided to speak about a couple of vulnerabilities I believe potential dangerous for internet users. There is no peace for browsers, this category of application is considered a privileged target for hackers due their large diffusion. Once again […]

Pierluigi Paganini October 12, 2012
Who is attacking the financial world, and why?

Article published on The Malta Indipendent on October 7th 2012 Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins   Bank (in)Security:   Between the 1880s and the 1930s, physical bank burglaries were a substantial problem.  To counter these threats bank’s employed vaults to protect their contents from theft, unauthorised use, fire, natural disasters, and other […]

Pierluigi Paganini October 10, 2012
Ponemon statistics 2012 on cost of cybercrime

At the American Enterprise Institute (AEI) event “Cybersecurity and American power,” Gen. K.B. Alexander, director of the National Security Agency (NSA) and chief at the Central Security Service (CSS), defined cybercrime “the greatest transfer of wealth in history.” alerting Government on the emergency related to intellectual property theft due cyber espionage. “Symantec placed the cost of […]

Pierluigi Paganini October 09, 2012
Hackers planning massive attacks against U.S. banks, is it possible?

In the last weeks we have assisted to a massive DDoS attacks against U.S. financial institutions that demonstrated how much invasive is this type of offensive. The dimension of the attacks was very impressive considering that it has beaten the defense systems of so large organizations, experts believe it is negligible if compared to the […]

Pierluigi Paganini October 08, 2012
Why do we need hackers today?

In the last decade the role of hacker is deeply changed, these strange characters were once kept away from government affairs, but the scenario is reversed, there has been an unprecedented technological evolution and principal countries have discovered a new way of making war, a new way of spying. Today the hacker is the most […]

Pierluigi Paganini October 07, 2012
Team GhostShell hacktivists against temples of knowledge

In this days the hacking group Team GhostShell claimed credit for the hack of  servers of the 100 principal universities from around the world, including Stanford, Princeton Harvard, the University of Michigan and also the Italian University of Rome. The hackers named the campaign #ProjectWestWind. The group accessed to the databases of universities stealing hundred of […]

Pierluigi Paganini October 05, 2012
GAO invites FDA to improve Information Security for medical devices

In the last decade the number of cyber incidents related to technologies that surround us is growth exponentially, the principal concerns are related to all those objects with an “intelligent component” that we daily use and that we expose on internet for different purposes. This category includes also the Medical devices, elements with increasing complexity […]

Pierluigi Paganini October 02, 2012
Chinese cyber attack against White House Office

The news is circulating on internet creating great concern, once again Chinese hackers have hit an infrastructure of a foreign state, once again we are speaking of cyber espionage but this time the victim is excellent because they were able to access the White House Military Office. The Washington Free Beacon announced the cyber attack […]

Pierluigi Paganini September 17, 2012
The good and the bad of the Deep Web

  Article Published on The Hacker New Magazine – September Edition “Security in a serious way” Introduction The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines, according a raw estimation of some security experts clear web represents only a small portion of the […]

Pierluigi Paganini September 14, 2012
Botnet, pro & cons of using Tor Networks

As declared several time Deep Web, thanks to the anonymity of its connection, provides to cyber criminals an ideal environment to grow up profitable business. We have mainly discussed of deep web such as a portion of cyber space mainly used to sell any kind of good, from malware agent to drugs and other criminal […]