Security

Pierluigi Paganini January 21, 2012
Anonymous “United as one, divided by zero” a click for freedom

In these days we have witnessed the escalation of operations conducted by the Anonymous group, the hacker group that is espressing a social dissent througth cyber attacks. The Internet world is profoundly changing, and the threat of hacktivist groups represents one of the major cyber threats. We must consider that the attacks of these groups […]

Pierluigi Paganini January 20, 2012
Which is the main cyber threat? The violated freedom

In these days we have witnessed the escalation of attacks who took the state of Israel as a target. Groups of hackers have coalesced to express their dissent against the policy government. I mention this case because I consider emblematic the answer provided by the Israeli government officials, they have declared infact that attacks like […]

Pierluigi Paganini January 18, 2012
Symantec, the inconvenient truth on the data breach

Do you remember the case of Symantec and the theft of the source code of some of its products by an Indian group of hackers called the lord of Dharmaraja? On that occasion it was declared by Symantec officials that the source code of its products had been stolen in a successful attack to the […]

Pierluigi Paganini January 15, 2012
Japan Aerospace Exploration Agency hit by malware

To news like this we are dangerously getting used, the scenarios change but the dynamics are often the same, viruses used such as cyber weapon that infect critical structures, causing loss of valuable information and that block system of target systems. The news has been announced  by the same “Japan Aerospace Exploration Agency (JAXA)” that […]

Pierluigi Paganini January 14, 2012
Sykipot attacks U.S PKI infrastructures based on smart cards

In these hours on the web is turning the news of a cyber attack performed by a group of Chinese hackers against some U.S. Government Agencies. Once again, the weapon used against the strategic objectives is a cyber weapon, in particular it has been used a new version of the trojan Sykipot. Chinese hackers have […]

Pierluigi Paganini January 13, 2012
Critical infrastructures – Main threats for 2G and 3G mobile networks

Which is the critical infrastructure of a country that is most exposed to cyber threat?  The question is difficult to answer, without doubts. Communication infrastructure is a vital component of every country and we add that unlike other infrastructure it could be targeted in an attack also with the only destructive purpose with the intent […]

Pierluigi Paganini January 12, 2012
Cyber threats from military sector to business

Searching in Internet the words “Cyberwar” and “cyberware” you will immediately realize how high is the interest in the matter. An ocean of information that demonstates the growing interest in the matter and that awaken in many ancestral fears. The spectrum is that of a conflict, the scenario is the cyber space. Governments around the world […]

Pierluigi Paganini January 08, 2012
“Cyber China” From Operation Aurora to China Cyber attacks Syndrome

Cyber China is considered the most active persistent collector of Western intelligence and intellectual property, is it a syndrome or China represents a real threat? When we think of China in relation to cyber warfare, we imagine an army of hackers hired by the government in a computer room ready to successfully attack any potential target. China […]

Pierluigi Paganini January 06, 2012
The nightmare backdoor , reflections on the case Huawei

Just at this time I came across an interesting discussion proposed by a colleague on the possible presence of a backdoor in the devices of Huawei company. The news in itself is terrifying, even if it is discussed for years. The presence of a backdoor once again raises the issue of qualification of the hardware, […]

Pierluigi Paganini January 03, 2012
The strategic importance of censorship in search engines

Every day, billions of people making an unimaginable number of searches through search engines. Complex algorithms seek to recover in the shortest possible time and with greater sorrowfulness the requested information. We may venture that a good 80% of Internet users interact with the web through these powerful applications. But the engines are much more, […]