Pierluigi Paganini September 17, 2012
The good and the bad of the Deep Web

  Article Published on The Hacker New Magazine – September Edition “Security in a serious way” Introduction The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines, according a raw estimation of some security experts clear web represents only a small portion of the […]

Pierluigi Paganini September 16, 2012
Microsoft distrupts Nitol botnet, malware hidden in supply chain

The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or with a cyber scam, malicious agents are around us, they have infected a huge quantity of machines with dramatic consequences. But what’s happen if we discover the malware inside the controller of ordinary object that […]

Pierluigi Paganini September 13, 2012
Cybercrime evolution in North America and Western Europe

Despite cyber space is known as a domain without border an interesting study of the Kaspersky Security firm demonstrates that cyber criminal activities are mainly located in some area of the planet, as we can see also the victims of the attacks have a geographical features that make them attractive targets. Factors such as the […]

Pierluigi Paganini September 07, 2012
Dangerous waves of malware are transforming cyberspace in a jungle

The cyberspace is becoming a jungle of malware, a place where the danger is just around the corner. Governments, cyber criminals, hacktivist and terrorist are focusing their activities in the new domain due this reason we are assisting to the born of new agents and very sophisticated attack tools. In a parallel manner is lowering […]

Pierluigi Paganini September 04, 2012
FireEye Advanced Threat Report…the inadequacy of the defense

The security firm FireEye has released  an interesting report  named “Advanced Threat Report” related first half of 2012 that provides an overview of the current threat landscape, evolving advanced malware and advanced persistent threat (APT) tactics, and the level of infiltration seen in organizations’ networks today. The report presents and alarming scenario, the organizations are […]

Pierluigi Paganini August 31, 2012
Wiper, assumptions and difficulties analyzing a malware

During last April many press agencies and security firms published a story related to the detection of a new malware, named Wiper that attacked computers at businesses throughout Iran. Kaspersky Lab and the International Telecommunications Union (ITU) investigated on the event trying to isolate the malware and analyze it. During the investigation the team of […]

Pierluigi Paganini August 31, 2012
RasGas, new cyber attack against an energy company

A new strange attack has hit Qatar’s natural gas pumper RasGas, like happened to Saudi Aramco company a virus has infected machines of its network. RasGas is a joint venture between Qatar Petroleum and ExxonMobil operating in Qatar that has an annual export quote of 36.3 million tonnes of liquefied natural gas. The attack has […]

Pierluigi Paganini August 30, 2012
Iran suspected for the attack on the Saudi Aramco

Last week it was announced by Saudi Arabia’s oil company, Saudi Aramco that its systems and its internal network were victims of a cyber attack. Recently the company has given more info on the incident declaring that the systems are back up after the attack made by a virus that infected 30,000 work stations. All […]

Pierluigi Paganini August 24, 2012
Malware, a cyber threat increasingly difficult to contain

Article published on Hakin9 IT Security Magazine – August 2012 When we speak about malware we introduce one of the worst cyber threat that daily evolve with the capacity to hit every sector without distinction. The world “malware” is really generic, we refer in fact a heterogeneous family of malicious software designed with the purpose […]

Pierluigi Paganini August 23, 2012
Crisis malware threatens the virtualized environments

This is an hot summer under the malware perspective, we have spoken of new malware for cyber espionage and of new fraud schemas based on malicious software diffusion. Many experts use to avoid malware diffusion making risky navigation and operations in a Virtual environment, a paradigm that is having a great diffusion in the last […]