Security

Pierluigi Paganini June 17, 2013
Palantir, private industries … Who helped NSA to build Prism?

Palantir Technologies is considered the principal company behind the design of software used for PRISM program, think of it as the work of a single company is truly an understatement. Palantir Technologies, this is the most popular company name referred when discussing those who have supported the U.S. Government in the development of massive surveillance […]

Pierluigi Paganini June 15, 2013
Iranian Gmail accounts targeted by state-sponsored attack

Google revealed that tens of thousands of Gmail accounts belonging to Iranian users have been targeted by state-sponsored attacks. The Google company announced that tens of thousands of Gmail accounts of Iranian users have been targeted hacked. The attacks seem to be organized by a group of state sponsored hackers few days before presidential elections. The […]

Pierluigi Paganini June 14, 2013
US Cloud hosting providers targeted by cybercriminals

US Cloud hosting providers are chosen with increasing frequency as privileged targets of cybercrime, these platforms are ideal for the launch of cyber attacks financially motivated. Cloud hosting providers are becoming privileged targets of cybercrime, two malware researchers revealed in fact the number of cyber attacks financially motivated against those platforms is increasing. Mary Landesman, […]

Pierluigi Paganini June 13, 2013
The business behind a hacked email account

Which is the commercial value of a hacked email account in the underground? How cybercriminals use a compromised email account? Why do they have to hit me? Which is the commercial value of a hacked email account in the underground? Brian Krebs has recently published a valuable post on commercial value for a hacked email account, […]

Pierluigi Paganini June 10, 2013
DDoS Mitigation – Choosing a Cloud-based solution

An introduction of DDoS mitigation techniques focused on Cloud-based DDoS Mitigation solution, an approach implemented by many companies. Despite their prevalence, DDoS (Distributed Denial of Service) attacks have been erroneously considered minor attacks by some parts of the security community due their “limited” duration. Victims of DDoS attacks are typically forced to interrupt their services […]

Pierluigi Paganini June 07, 2013
PRISM – US Top Secret massive surveillance program revealed

The top-secret PRISM project claims direct access to servers of major IT corporates including Google, Apple and Facebook. The recent news on the control of communications made ​​by the US Government through the PRISM program has literally left bewildered public opinion, everyone imagined it but when the Population has been confronted with the evidence remained shocked. […]

Pierluigi Paganini June 06, 2013
NSA collecting phone records of millions of US citizens daily

The U.S. NSA is collecting phone records of millions of Verizon Communications customers, according to a secret court order obtained by the Guardian. The U.S. NSA is collecting phone records of millions of customers Verizon, the second telephone company in the country. The shocking news has been revealed by ‘Guardian‘ whose journalists had access to a “Top […]

Pierluigi Paganini June 04, 2013
Mactans charger, a malicious hardware that could infect any Apple iOS devices

Mactans charger, this is the name of the malicious charger that will be presented by researchers at the Black Hat 2013 conference in July that is able to inoculate a malware in any Apple iOS devices. Researchers from the Georgia Institute of Technology  announced the creation of Mactans charger, a custom wall charger for Apple iPhone and iPad […]

Pierluigi Paganini June 03, 2013
Senior management considered a primary target by modern cybercrime

According to a recent research of Group-IB on cybercrime senior management is considered among most privileged targets. Group-IB is one of the leading companies in fraud prevention, cybercrime and high-tech crime investigations, it is IMPACT-ITU member and one of most active firms in the analysis if cyber criminal phenomena. The firm reported that cyber criminals use personal and confidential data of […]

Pierluigi Paganini June 02, 2013
iCloud two-factor protection, security flaw or deliberate choice?

iCloud could not properly protect the user’s data despite the implementation of a two-factor protection. Millions of users access to the iCloud to store their data such as photos, music and documents and Apple has tried recently to improve their security introducing in March a two factor authentication system … Do users really know the security mechanisms that […]