The Middle East has always been considered an area of the planet’s turbulent for the continuing conflict and political tensions among the states that inhabit it. In the last two years, the tensions seem to have intensified and with it has grown the diffusion of malware for cyber espionage and for offensive purposes. In the […]
Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace The military strategist Carl von Clausewitz stated: âAll war presupposes human weakness and seeks to exploit it.â Malicious software (malware) is software that is explicitly designed to exploit vulnerabilities in computing devices and human users to the malicious advantage of the malware […]
Today I had the opportunity to analyze the a majority-owned subsidiary of Alcatel-Lucent, that shows a worrying scenario, around 14 percent of home networks were infected with malware in the period between April and June 2012. Researchers declared: “We saw an increase in the number of home networks infected as compared to first quarter 2012,” One […]
Again another great investigation of the excellent team of Kaspersky lab and its partner Seculert firm has discovered an ongoing campaign to conduct a large scale infiltration of computer systems in the Middle East area. The campaign has targeted individuals across several states of the area such as Iran, Afghanistan and also Israel. The operation […]
In the last decade we have observed the raise of cyber attacks, no matter their purpose, cyber warfare or cyber espionage for military or private business, they have demonstrated how much dangerous is a cyber offensive. The U.S.’s leading cyberwarrior has estimated that private businesses are losing hundreds of billions to cyber espionage and cybercrimes, […]
Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, David Pace The London 2012 Olympics will bring together 10,500 athletes, diplomats, politicians, business leaders and millions of spectators from all over the world. Behind the scenes there is an immense effort being made to ensure the security and well-being of everyone participating, in any […]
The malware factory still evolving, every day security firms detect new cyber threats that show new sophisticated techniques to avoid protection systems, this is a war that law enforcement fight against cyber criminals. Internet has a new web exploit produced by crime industry, its particularity is that in the deployment phase it is able to […]
It’s been long debated the need to protect critical infrastructures from cyber attacks, cyber threats could hit foreign countries causing loss of human lives identically to a conventional attack. Donât forget that similar attacks con be organized by state-sponsored hackers or cyber criminals with the different purposes, target destroying or cyber espionage. Emergency Response Teams […]
The story begins in November 2011 when in Estonia was arrested a group of persons accused of having developed the dreaded trojan that seems to be able to spread with surprising ease building a scary botnet. The botnet operated by Rove Digital altered user DNS settings, pointing victims to malicious DNS in data centers in […]
We all remember the Citadel trojan, based on the Zeus experience has evolved becoming one of the most interesting cyber criminal project. Few months ago I wrote on the excellent customer relationship management (CRM) model implemented by its creators. Thanks a malware evolution dictated by market needs, the trojan has evolved in time, many instances […]