Security

Pierluigi Paganini June 23, 2015
What is the Dark Web and Why is it so popular?

What is the Dark Web? Unveiling the myth of the Dark Web and making sure that people understand its magnitude and its limitations. Let’s begin by explaining what the so called “Dark Web” actually is. This is a term used to describe a collection of websites that may be publicly visible, but they hide information […]

Pierluigi Paganini June 22, 2015
Isis’s propaganda machine hunted down by Europol Web unit

The Europol announced the creation of a team that aims to find key figures in propaganda campaigns run by ISIS members seeking to recruit foreign fighters. Isis‘s machine propaganda is a very important target, since it generates something like 100.000 daily tweets, and it’s used to recruit foreign fighters to support the group. Isis is gaining […]

Pierluigi Paganini June 21, 2015
Signal amplification and brute-force attack for car thieves

A recent wave of car burglaries raises the debate on possible hacking techniques adopted by car thieves .. Signal amplification and brute-force attacks. A few months ago the journalist Nick Bilton wrote about his car being broken into in front of him. Bilton believes that his car was stolen by using snatched with the help of a signal […]

Pierluigi Paganini June 21, 2015
Electronic Frontier Foundation – WhatsApp ranked as the worst at protecting users’ privacy

The Electronic Frontier Foundation published the “Who Has Your Back? 2015” report that ranked WhatsApp ranked as the worst in protecting users’ privacy. The Electronic Frontier Foundation has published its annual report “Who Has Your Back? 2015: Protecting Your Data From Government Requests” that analyzes how private companies handlesusers data with specific focus on Government surveillance. “Which […]

Pierluigi Paganini June 20, 2015
Evolution of 3D Printing Technology Raises Security Concerns

This post is an excerpt from the article titled “Evolution of 3D Printing Technology Raises Security Concerns” available on the Infosec Institute. Also known as the term additive manufacturing (AM), 3D printing is a process for making a three-dimensional object of almost any shape starting from a 3D model or other electronic data source. Through […]

Pierluigi Paganini June 20, 2015
NIST is seeking more advanced tattoo forensic analysis

NIST is seeking more advanced tattoo forensic analysis, matching the tattoos into a computer system could help law enforcement to catch more offenders. One in five American adults has at least one tattoo and this number is much higher among the criminal population. Law enforcement has used tattoos as a means of criminals and victim […]

Pierluigi Paganini June 18, 2015
Cyberspace under a shadow of Cyber Poisons and Antidotes

Period 2015 has become a continuous process of turbulent scenarios in cyberspace because new potential threats, by dealing new opportunities for cybercrime. Period 2015 has become a continuous process of turbulent scenarios in cyberspace because new potential threats, by dealing new opportunities for cybercrime with massive Cyber Poisons. Nevertheless, Antidotes are also part of a […]

Pierluigi Paganini June 17, 2015
Cyber attacks against VOIP systems on the rise

Security experts at Nettitude reported that VoIP (Voice over IP) infrastructures worldwide are targeted by a growing number of cyber attacks. A new wave of attacks against Voice over IP (VoIP) systems is targeting UK businesses, security experts believe that a surge was advantaged by the greater availability of hacking tools in the criminal underground. […]

Pierluigi Paganini June 15, 2015
50 million users can be exposed to Malvertising

A security researcher said that a malvertising campaign could affect as many as 50M users, it affected some popular web sites like Facebook’s Bejewelled Blitz. According to a security researcher at malvertising attack can affect around 50 million users, and hit known social media websites like Facebook. “One of the main features about this attack was its […]

Pierluigi Paganini June 15, 2015
Russia and China have hacked into Snowden’s files, endangering US and British agents

Russia and China have hacked the secret cache of files stolen by the Edward Snowden, forcing the British intelligence to pull agents out of live operations. Russia and China have hacked the secret cache of files stolen by the Edward Snowden, forcing the British intelligence to pull agents out of live operations. The British Sunday Times revealed that […]