Security

Pierluigi Paganini December 11, 2013
Near East – new heaven for bulletproof hosting providers, first effects of cyberwar

Intelligence experts at IntelCrawler discovered a Russian-speaking group offers bulletproof hosting in Syria, Lebanon … Countries that represent the new heaven for cybercriminals   IntelCrawler: «Near East – new heaven for bulletproof hosting providers, first effects of war on cyberspace in action» Los-Angeles CA– The US based cyber and risk intelligence provider IntelCrawler has announced […]

Pierluigi Paganini December 10, 2013
Chinese Hackers Spying on European Diplomats

Security experts at FireEye discovered a cyber espionage operation conducted by Chinese hackers on the computer at the foreign ministries of the Czech Republic, Portugal, Bulgaria, Latvia and Hungary. Security experts at FireEye have revealed that they were able to track Chinese hackers spying on EU foreign ministries for about a week. The hackers have targeted the computers belonging at […]

Pierluigi Paganini December 10, 2013
NSA and GCHQ infiltrated virtual online gaming communities

The Guardian published documents that reveal NSA and GCHQ infiltrate gaming platforms and communities including World of Warcraft and Second Life NSA and British  GCHQ are working to infiltrate the virtual world of online games considered as an attractive environment for cyber terrorists and hackers, this is the last chapter of the Snowden‘s Saga. The Guardian […]

Pierluigi Paganini December 09, 2013
Linkedin iOS app V 6_1_2 HTML message parsing vulnerability

LinkedIn iOS app parses HTML in the messages, and this can be used to phish for credentials or be escalated into a full blown attack. Senior CyberSecurity Specialist Zouheir Abdallah @ZuZ  (Twitter handle), has publicly and responsibly disclosed a vulnerability in LinkedIn’s mobile app. Zouheir is known for reporting a serious vulnerability in DropBox’s 2 Factor […]

Pierluigi Paganini December 08, 2013
French Government ANSSI responsible of a MITM against Google SSL-TLS

Google discovered the unauthorized use of digital certificates issued by an intermediate certificate authority linked to ANSSI for several Google domains. Google has revealed that late on December 3rd it became aware of unauthorized digital certificates for several Google domains and immediately has started the investigation. Security experts at Google found that the digital certificates […]

Pierluigi Paganini December 08, 2013
Zero-day vulnerability exploits, too precious commodities

NSS Labs issued the report titled “The Known Unknowns” to explain dynamics behind the market of zero-day exploits. Last week I discussed about the necessity to define a model for “cyber conflict” to qualify the principal issues related to the use of cyber tools and cyber weapons in an Information Warfare context, today I decided […]

Pierluigi Paganini December 07, 2013
Microsoft,Europol,FBI and partners decapitated ZeroAccess botnet

Microsoft Digital Crimes Unit, FBI, Europol and industry partners decapitated the feared ZeroAccess botnet that hijacks search results Microsoft this week has announced that thanks to a joint operation of its Digital Crimes Unit and the Federal Bureau of Investigation (FBI), Europol’s European Cybercrime Centre (EC3) and technology companies has decapitated ZeroAccess botnet.     […]

Pierluigi Paganini December 07, 2013
Android game allows WhatsApp conversations snooping

Google has recently removed from the official Play store the ” Balloon Pop 2″ Android game that allows WhatsApp conversations snooping. Every day numerous friends ask me if it is possible to steal WhatsApp chat messages and how, of course a malware represents an excellent solution to the request. In the past I already posted […]

Pierluigi Paganini December 06, 2013
Cyber warfare – Why we need to define a model of conflict?

Cyber warfare or information warfare is still a gray area of the military doctrine, it is necessary to define the “model of conflict” and rules for the actors. Cyber war and cyber information warfare are two terms very inflated used to describe the current disputes within the cyberspace.  To explain the effect of acts of […]

Pierluigi Paganini December 04, 2013
Malware can infect system using Inaudible Audio signals

German researchers demonstrated how a malware can infect system in air gapped networks and transfer stolen data using Inaudible Audio signals. The shocking news that it is possible to infect a computer with Inaudible Audio signals is circulating within the security community has been circulating for several weeks between denials and confirmations. In October the […]