Security

Pierluigi Paganini September 03, 2012
Social Networks Part 3 – Are you exposing yourself unnecessarily to physical threats?

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our first article we talked about the intentional or unintentional disclosure of personal information in social networks that can expose you to logical (computer-based) threats and we gave you some recommendations about how to properly manage this risk of […]

Pierluigi Paganini September 02, 2012
Anonymous, from Philips to UK Government…a hot autumn is coming

The summer is ending and we must be prepared to a new season of attacks of Anonymous collective, last weeks we have registered several attacks of the group of hackers that suggest a warm autumn. Last week with a series of attacks Anonymous targets Electronics Manufacturer AVX, the hackers have hit the website for electronics […]

Pierluigi Paganini August 31, 2012
Wiper, assumptions and difficulties analyzing a malware

During last April many press agencies and security firms published a story related to the detection of a new malware, named Wiper that attacked computers at businesses throughout Iran. Kaspersky Lab and the International Telecommunications Union (ITU) investigated on the event trying to isolate the malware and analyze it. During the investigation the team of […]

Pierluigi Paganini August 31, 2012
RasGas, new cyber attack against an energy company

A new strange attack has hit Qatar’s natural gas pumper RasGas, like happened to Saudi Aramco company a virus has infected machines of its network. RasGas is a joint venture between Qatar Petroleum and ExxonMobil operating in Qatar that has an annual export quote of 36.3 million tonnes of liquefied natural gas. The attack has […]

Pierluigi Paganini August 30, 2012
Iran suspected for the attack on the Saudi Aramco

Last week it was announced by Saudi Arabia’s oil company, Saudi Aramco that its systems and its internal network were victims of a cyber attack. Recently the company has given more info on the incident declaring that the systems are back up after the attack made by a virus that infected 30,000 work stations. All […]

Pierluigi Paganini August 29, 2012
DDoS attacks, so simple so dangerous

Article Published on DDoS Attacks PT Extra 05_2012 The article proposes an analysis of DDoS attacks, explaining how the offensive technique is used in several contexts to hit strategic targets for different purposes. The discussion is supported with the statistics provided by the principal security firms that provide solutions to protect infrastructures from this kind of […]

Pierluigi Paganini August 28, 2012
U.S. admit cyber attacks.Who will decide in future conflict,humans or machines?

The U.S. are one of the most advanced country under cyber warfare perspective, we have read a lot on its capabilities and its offensive power, to remark some sample we can remind the plan-X project and the development of the cyber weapon Stuxnet. We all imagine that the U.S. are still really active in the […]

Pierluigi Paganini August 27, 2012
Social Networks Part 2 – Have you been infiltrated?

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins The explosion of social networks and new user accounts in recent years is staggering. There are now over 1,000 social networking sites on the Internet, with Facebook currently being the largest, with over 840 million user profiles. To put this […]

Pierluigi Paganini August 24, 2012
Malware, a cyber threat increasingly difficult to contain

Article published on Hakin9 IT Security Magazine – August 2012 When we speak about malware we introduce one of the worst cyber threat that daily evolve with the capacity to hit every sector without distinction. The world “malware” is really generic, we refer in fact a heterogeneous family of malicious software designed with the purpose […]

Pierluigi Paganini August 23, 2012
Crisis malware threatens the virtualized environments

This is an hot summer under the malware perspective, we have spoken of new malware for cyber espionage and of new fraud schemas based on malicious software diffusion. Many experts use to avoid malware diffusion making risky navigation and operations in a Virtual environment, a paradigm that is having a great diffusion in the last […]