The Economy of India is the ninth largest in the world by nominal GDP and the fourth largest by purchasing power parity (PPP). The country is a part of the G-20 major economies, Goldman Sachs predicts that “from 2007 to 2020, India’s GDP per capita in US$ terms will quadruple”, and that the Indian economy will surpass the United States (in US$) by 2043, this are […]
Cyber warfare expert John Bumgarner claims that the Stuxnet and Duqu virus have been active for much longer than previously suspected, he says that they are active in different variant since 2006. Precisely he claims that the Stuxnet computer virus is linked to Conficker, a mysterious “worm” that surfaced in late 2008 and infected millions […]
During this days I had the opportunity to read the results of a couple of surveys: The PricewaterhouseCoopers (PwC). Its Global Economic Crime Survey has demonstrated that Cybercrime has double digit growth being today third biggest crime threat in UK businesses behind asset theft crimes, frauds and corruption Norton Cybercrime Report: The Human Impact, an groundbreaking study […]
Let we use these ingredients to start some serious reflection on safety issues related to mobile devices: Robust growth in the mobile market, accompanied by technological advances that have made these devices real PC. No awareness of those who use mobile terminals in relation to threats that they face. 2011 years of overtaking sales of […]
Are we able to ensure that every peripherals connected to our computers and present in our offices is proof of attack? The first answer will be … “sure”. We observe same problem with our household appliance that are being more intelligent. The evolution of automation and technology push in the direction of making each device available on the network. This is open up new and interesting hacking scenarios. In this days I have read a news on a web […]
The SCADA systems at the Water utilities in Illinois were hacked by a malicious attacker. “the SCADA system was powered on and off, burning out a water pump.” This is what the hacker has posted giving proof of a direct compromise of the SCADA systems at this water utility confirming that there was actual damage. […]
Last week I had the opportunity to discuss with my father of adverse economic situation and in particular of the Italian public spending. I have introduced some reference to the arms and in particular cyber weapons. What are they? What are the threats we face? What is the social cost to fight and mitigate the […]
What is purpose for DNS cache poisoning attacks? DNS cache poisoning is an attack methodology used to compromise in the Domain Name System and is made introduceding data artifacts into a DNS name server’s cache database that did not originate from authoritative sources. Consider that the domain name server translates a domain name into an specific […]
F-Secure Researchers have discovered a digitally signed malware that has code signed with a stolen government certificate belonging to the Malaysian Agricultural Research and Development Institute. The issue has long been known and this attack methodic has triggered a widespread lack of confidence in the process of trusting based on the use of certificates. The impairment […]
In recent months we have read many reports related the analysis of the famous malware and different assumptions about its genesis. Who designed the malicious agent? For what purpose? What features of Duqu we know? How can protect our structure from this threat? Let’s approach the questions step by step talking about its origin, on which much has been discussed. Comparing Stuxnet to Duqu Many researcher indicate that Stuxnet is the progenitor of the Duqu, both […]