Trend Micro published a very interesting report on the Russian underground market, the document written by Max Goncharov analyzed the services and the products marketed by cyber criminals. The study is based on data obtained from the analysis of online forums and services attended by Russian hackers such as antichat.ru, xeka.ru, and carding-cc.com. Trend Micro […]
Trend Micro has released the report “3Q 2012 SECURITY ROUNDUP -Android Under Siege: Popularity Comes at a Price” that presents a worrying trend for malware growth increased of 483%. The increment include cyber espionage malware and also destructive malicious agents targeting mainly the mobile world and in particular Google Android platform. Malware targeting Android platform increased […]
After much work during the last months I’m proud and happpy to announce the publishing of The Deep Dark Web book. It is AVAILABLE @Amazon website  http://www.amazon.com/The-Deep-Dark-Web-hidden/dp/1480177598 PAPER BOOK It is AVAILABLE @Amazon website  http://www.amazon.com/dp/B009VN40DU KINDLE It is AVAILABLE @SmashWords website  http://www.smashwords.com/books/view/247146 It is AVAILABLE @Barnes & Noble website    http://www.barnesandnoble.com/w/the-deep-dark-web-pierluigi-paganini/1113594408?ean=2940015852837 and we have uploaded it also to Amazon […]
Last May The Iranian Computer Emergency Response Team (MAHER) detected a new targeted malware which hit the country, that has been named Flame, also known as Flamer or Skywiper, due the name of  its main attack module. MAHER wasn’t the only one to detect the agent, also Kaspersky Lab and CrySyS Lab identified the new dangerous malware, recognized […]
Article published on The Malta Indipendent on October 7th 2012 Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins Bank (in)Security:   Between the 1880s and the 1930s, physical bank burglaries were a substantial problem.  To counter these threats bank’s employed vaults to protect their contents from theft, unauthorised use, fire, natural disasters, and other […]
What could happen if a malware compromises a communication system adopted daily by 663 million users (info dated September 2011)? Security experts have spread an alert to Skype users about an ongoing attack that try to induce them to load a link that spreads malware. The famous voice-over-Internet application is totally changed from its original […]
It’s known that military sector represents a privileged incubator for new technologies than in many cases are subsequently used in civil. The mobile sector represents one of the most vulnerable environments due the lack of awareness on cyber threats and the increasing number of malware that are affecting devices devoid of any defense system. These […]
It’s happened again, cyber criminals have stolen digital certificates related to companies recognized reliable to sign malicious code. This time the victim is Adobe and according its security chief, Brad Arkin, a group of hackers have signed malware using Adobe digital certificate obtained compromising a vulnerable build server that was used to get code validation […]
Since last month a new campaign of cyber attacks have hit the Energy sector, all is started with the incidents to Saudi Aramco and RasGas companies, in both cases a malware infected internal networks without impacting on the production systems. Due the nature of the targets, the mode of attack and the specific malware behavior […]
Article published on Hakin9 IT Security Magazine “Raspberry Pi Hacking – Exploiting Software” 08/12 The article proposes an analysis of the main cyber threats that worry security experts and that are profoundly changing the cyber space. The exponential growth of the number of cyber threats and attacks is rebutted by a wide range of statistical […]