Security

Pierluigi Paganini January 11, 2013
SCADA and critical infrastructures, in … security

According last report published by The European Network and Information Security Agency (ENISA)   “ENISA Threat Landscape – Responding to the Evolving Threat Environment” that summarizes principal cyber threats, critical infrastructures represent privileged targets for emerging trends. Different agents such as terrorists, state-sponsored hackers or hacktivists could be interested in attack control systems within a critical […]

Pierluigi Paganini January 10, 2013
Stylometric analysis to track anonymous users in the underground

Law enforcement and intelligence agencies conscious of the high risks related to cyber threats have started massive monitoring campaign, everything must be controlled to avoid unpleasant surprises. The trend is shared by every governments of the planet, intelligence agencies are making great investments in term of money and resources to define new methods and to […]

Pierluigi Paganini January 09, 2013
My reading of the “ENISA Threat Landscape” report

The European Network and Information Security Agency (ENISA) is the EU’s agency responsible for cyber security issues of the European Union, its last report “ENISA Threat Landscape – Responding to the Evolving Threat Environment”, summarizing the principal threats and providing also useful indication on the emerging trends. The report proposes the list of top threats […]

Pierluigi Paganini January 08, 2013
SkypeHide system, steganography to secure communications on Skype

In this period there is an intense debate on the wiretapping of every communication channel, governments are increasing the monitoring of internet, of social network platforms and VOIP conversations in many cases with supports of the companies that provide those services. In a recent post I discussed on the control ordered by Indian Governments that […]

Pierluigi Paganini January 07, 2013
Iran and India, control and monitoring of networks

The news is circulating for days, the Iranian head of the national security forces , Esmail Ahmadi Moghadam, declared that low enforcement  of the country is developing a software for “smart control” of social-networking sites, the authorities have understood that the control of the powerful platforms is more important filtering. Moghadam exposed the consideration made […]

Pierluigi Paganini January 07, 2013
Happy Birthday Bitcoin

On this day Bitcoin turns 4 years old. As any 4 year old will tell you this has been a wild ride. From a little know digital currency to today’s acceptance into the legal banks and marketplace this little currency that could has shocked world leaders, stunned banking officials all over the world trading and […]

Pierluigi Paganini January 06, 2013
Zero-day vulnerability in Symantec PGP Whole Disk Encryption

IT community become familiar with the concept of zero-day vulnerability, no matter if it is related to SCADA system or mobile phone firmware, it could allow a hacker to silently interfere with user’s life, exposing it to serious risks. This time the product affected by the vulnerability is produced by Symantec, it is PGP Whole […]

Pierluigi Paganini January 05, 2013
Confidential documents from Japanese politics stolen by malware

Last December Japan Aerospace Exploration Agency was hit again by malware  that stolen secret information on newest rockets from an internal computer, it was not first time for the Japanese agency that was already victim of a cyber attack having same purpose, cyber espionage to obtain information on another technological advanced project related to the […]

Pierluigi Paganini January 04, 2013
Turkey – Another story on use of fraudulent digital certificates

It’s the news of the day, a fraudulent digital certificate that could be used for active phishing attacks against Google’s web properties. Using the certificate it is possible to spoof content in a classic phishing schema or perform a man-in-the-middle attack according Google Chrome Security Team and Microsoft experts. Microsoft has been immediately started the […]

Pierluigi Paganini January 02, 2013
DARPA HACMS program for a software without pervasive vulnerabilities

Technology in modern warfare has assumed a crucial role, every government is developing new cyber capabilities to be able to contrast and prevent cyber threats the fifth domain of warfare, the cyberspace. Today the concept of warfare is profoundly changed, many states choose to attack foreign governments exploring new technological options, from state-sponsored cyber attacks […]