Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, David Pace The London 2012 Olympics will bring together 10,500 athletes, diplomats, politicians, business leaders and millions of spectators from all over the world. Behind the scenes there is an immense effort being made to ensure the security and well-being of everyone participating, in any […]
The malware factory still evolving, every day security firms detect new cyber threats that show new sophisticated techniques to avoid protection systems, this is a war that law enforcement fight against cyber criminals. Internet has a new web exploit produced by crime industry, its particularity is that in the deployment phase it is able to […]
It’s been long debated the need to protect critical infrastructures from cyber attacks, cyber threats could hit foreign countries causing loss of human lives identically to a conventional attack. Don’t forget that similar attacks con be organized by state-sponsored hackers or cyber criminals with the different purposes, target destroying or cyber espionage. Emergency Response Teams […]
The story begins in November 2011 when in Estonia was arrested a group of persons accused of having developed the dreaded trojan that seems to be able to spread with surprising ease building a scary botnet. The botnet operated by Rove Digital altered user DNS settings, pointing victims to malicious DNS in data centers in […]
We all remember the Citadel trojan, based on the Zeus experience has evolved becoming one of the most interesting cyber criminal project. Few months ago I wrote on the excellent customer relationship management (CRM) model implemented by its creators. Thanks a malware evolution dictated by market needs, the trojan has evolved in time, many instances […]
Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used in Tibet against Uyghur hacktivists, a Turkic ethnic group living in Eastern and Central Asia. The instance of Tibet malware detected infects OS X machines and is spread following a consolidated schema for politically motivated […]
It’s not first time we discuss of cybercrime and in particular of its organizational models, creative servicex offer any kind of support to organizations and individuals that desire to conduct an attack against specific target. Cyber criminals in the past have already used cloud architectures to rent computational resources to involve in powerful cyber attacks. […]
Winds of cyber war blow Iran, the political situation is becoming difficult to manage, exacerbating the tones of a psychological battle growing. After the publishing of the news regarding the genesis of Stuxnet and Flame every actor of the conflict has increased the effort on cyber warfare especially on cyber defense fearing an imminent cyber […]
In recent years we are assisting to a profoundly change in the nature of malware, it is increased the development for spy purposes, for its spread in both private and government sectors. The recent case of Flame malware has demonstrated the efficiency of a malicious agent as a gathering tool in a typical context of […]
Money motivates the cyber assault to banking by cybercrime, but the finance world is also considered a privileged target for sponsored-state attacks as part of cyber offense strategies. Let’s consider that the banking world is profoundly changing, the introduction of mobile devices, social networks, the openess to web services, the coming of new technologies such […]