Security

Pierluigi Paganini April 05, 2012
Anonymous, its strategy against censorship and the diversionary theory

Groups of hacktivist like Anonymous are the actual news of the global technology landscape, a new force with which and against which confront. As repeatedly stressed I consider the moment of confrontation with the group a moment of growth for the IT professional in many ways, on all: having to deal with the cyber threat that […]

Pierluigi Paganini April 04, 2012
1-day exploits,Binary Diffing & patch management.The side threats

Recently ESET security firm has reported the latest version of the Blackhole exploit kit that has been updated to include a new exploit for the Java CVE-2012-0507 vulnerability.  The exploit was discovered for the first time on 7.03.2012 and it first detections were dated on March 12, 2012 and today a public module for Metasploit […]

Pierluigi Paganini April 03, 2012
Cyber Weapons

Article Published on The Hacker New Magazine – April Edition “Cyber_Warfare” First let’s try to provide a definition of cyber-weapon, to do this I get inspiration from an article written by experts Thomas Rid and Peter McBurney. Correctly define cyber weapon has significant legal and political consequences as well as the security itself. The line […]

Pierluigi Paganini April 03, 2012
UPGRADE – VISA, MASTERCARD and GPN breach

The day is come, yesterday morning as planned Global Payments Inc., the Atlanta-based credit and debit card processor that recently announced a breach that exposed fewer than 1.5 million card accounts, held a conference call to discuss about the breach and its impacts. Again Krebson Security Blog is the more accredited source in my opinion, they […]

Pierluigi Paganini April 02, 2012
Chinese hackers & Operation ‘Luckycat’ against Japan, Tibet and India

Recently experts monitored several targeted attacks against Tibetan activist organizations including the International Campaign for Tibet and the Central Tibet Administration. Researchers suspect the involvement of China and on groups of hackers sponsored by the Beijing government. In multiple cases, we have seen how the Chinese government promotes and supports from the economic point of view […]

Pierluigi Paganini April 01, 2012
VISA & MASTERCARD breach raises Security doubts on standard compliance

The Krebs on Security blog reported that there has been a security breach at Global Payments that “may involve more than 10 million compromised card numbers.”  We are facing with a massive breach that could impact more over 10 million compromised card numbers, for this reason VISA and MasterCard are alerting banks across US about […]

Pierluigi Paganini March 30, 2012
Anonymous, Operation BlackOut and the two final

Hi all, I write a few hours before the fateful D-Day, March 31th … What happens tomorrow when I wake up? For sure I will breakfast, tomorrow I’ll not work so after breakfast turning on my PC will I be able to navigate on internet? What was the outcome of the Operation Blackout? I am the […]

Pierluigi Paganini March 30, 2012
North Korea scares the West

According to US official declarations North Korea has added new sophisticated cyber weapons to its arsenal, the event causes much concern in political and military. The dialogue between Western governments, and particularly the U.S, with the government in Pyongyang continues to be difficult, complicating the situation is the defiant attitude adopted by the North Korean government […]

Pierluigi Paganini March 29, 2012
Duqu – Cyber weapons factory still operating … it’s just the beginning

We all remember the decision of the western states to prohibit the sale of anti-virus systems to Tehran, penalties determined to thwart the development of Iran’s nuclear program. A predictable decision that haven’t created any problem the state that seems has developed a new antivirus program to immunize the systems from the notorious Stuxnet virus. […]

Pierluigi Paganini March 28, 2012
Japan and the privacy contradictions

The massive use of new technologies has often raised thorny questions about the privacy of network users. The most difficult issue to resolve in the necessary to reach a compromise to assure the users requirements of security and privacy. The debate generates heated arguments, confusion and sometimes decisions in apparent contrast. In Japan, to the multinational […]