Intelligence

Pierluigi Paganini December 29, 2014
NSA published reports containing declassified compliance errors

The National Security Agency (NSA) has released a collection of compliance reports that details failures and errors in compliance to US laws on surveillance. It’s Christmas time and the National Security Agency decided to post dozens of quarterly reports detailing cases where it potentially violated U.S. laws for monitoring of U.S. citizens and foreigners in […]

Pierluigi Paganini December 23, 2014
Seizure of the directory authorities could block the Tor network

The Tor network could be seriously impacted by the seizure of directory authorities operated by law enforcement, despite it is a precious resource for all. The overall architecture of Tor network relies on nine directory authorities locate in the Europe and United States. The servers working as directory authorities provide a signed list of all the […]

Pierluigi Paganini December 15, 2014
Stingray surveillance devices used to spy on the Norwegian Parliament

A newspaper discovers that bad actors are spying on cell phone communications of Norwegian politicians using the StingRay mobile surveillance equipment. The journalists of a daily newspaper in Norway have discovered a mobile phone surveillance equipment hidden around the Government and Parliamentary building and apparently there is no information on who has used it. Everyday we read about cyber […]

Pierluigi Paganini December 15, 2014
GCHQ launches Cryptoy mobile app to teach cryptography

Cryptoy is the free educational app about cryptography designed by GCHQ for use by secondary school students and their teachers. The British Intelligence agency GCHQ has launched “Cryptoy”, an Android mobile app that was designed to encourage youngsters to tackle emerging cyber security threats, the Agency made it available to download today. The Cryptoy mobile app was developed by […]

Pierluigi Paganini December 13, 2014
Internet of Things – Security and privacy issues presented at ISACA Roma & OWASP Italy conference

Yesterday Pierluigi Paganini presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. Yesterday I presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. The presentation highlights the security and privacy issues for the […]

Pierluigi Paganini December 11, 2014
Smartwatch Hacked, how to access data exchanged with Smartphone

Security experts at BitDefender demonstrated how is possible to access data exchanged between a smartwatch and a smartphone via Bluetooth. The paradigm of Internet of Things is influencing modern society and the way it approaches the technology in everyday life. An impressive amount of Intelligent devices surround us, but often we ignore the repercussion in term of security and privacy. […]

Pierluigi Paganini December 09, 2014
Detected the first samples of Penquin Turla for Linux systems

Security experts at Kaspersky Lab have detected the first strain of Turla malware that was designed to infect Linux system and so called Penquin Turla. Security Experts at Kaspersky have discovered a new variant of Turla malware which was designed to hit Linux systems and for this reason, it was called the Penquin Turla. The investigation […]

Pierluigi Paganini December 05, 2014
Op AURORAGOLD – NSA hacks cellphone networks worldwide

The Intercept revealed the Op AURORAGOLD run by the NSA to spy on hundreds of companies and organizations to hack cellphone networks worldwide. The Intercept has uncovered details of the operation AURORAGOLD, another massive surveillance program operated by the US Intelligence . The new program is ambitious, the NSA has developed AURORAGOLD with the intent to spy on every cellphone network in […]

Pierluigi Paganini December 03, 2014
Operation Cleaver – Iranian hackers target industries worldwide

Security firm Cylance revealed that Iranian hackers target airlines, energy, defense companies worldwide as part of the Operation Cleaver campaign. Security firm Cylance released a detailed report on the hacking Operation Cleaver that was run by state-sponsored hackers linked to the Iran. The Iranian hackers targeted critical infrastructure worldwide, ten of which are located in the United States. Experts at Cylance are cautions […]

Pierluigi Paganini December 01, 2014
Is it possible to attribute the backdoor Regin to the cybercrime?

The popular cyber security expert Raoul Chiesa commented the hypothesis that backdoor Regin is a product of organized cybercrime. Excerpt from a detailed analysis published on the Infosec Institute In this phase it is quite impossible to attribute precisely the development of the Regin malware to a specific category of threat actors. Until now we […]