Security

Pierluigi Paganini February 14, 2012
Trustwave vs Mozilla community for MITM Digital Certificate

After the attacks against certification authorities such as VeriSign, Comodo and DigiNotar the level of confidence in the model based on certificates is in sharp decline. There is widespread accusations addressed to the PKI paradigm (public key infrastructure ) which is based on the concept to request to trusted and credited third parties to guarantee […]

Pierluigi Paganini February 13, 2012
Iran case … security threat and oil business

At this time we are seeing continuing propaganda operations of Iranian government that is trying to convince with its proclamations the public opinion regarding technical capacities in its possession. Military troops, nuclear weapons, and a cyber army ready to destroy any enemy stronghold in cyber space. Too much experts believe that in reality, the West rather […]

Pierluigi Paganini February 11, 2012
KPN hacked, who and when warned users?

The nightmare of every Internet Service Provider has materialized in The Netherlands where KPN company, one of the main ISPs, has stopped to provide any email services after that a group of hackers has published the credentials of more than 500 customers on the internet. Once again to be discussed is the incident management and […]

Pierluigi Paganini February 10, 2012
Illustrious victim, Cia.gov Tango Down by Anonymous

Just this morning I wrote in my article the ability of the Anonymous group that stands out in my assessment for the effectiveness of its operations. I tried to analyze the phenomenon, and I noticed that many colleagues tend to approach hacktivists ideology as a student movement, disorganized, and that can only be due to […]

Pierluigi Paganini February 10, 2012
Anonymous, it could become a cyber weapon

The group of hacktivist known as Anonymous is considered as the uncontrollable variable in the cyber space capable of surprising us with striking operations worthy of the most skilled cyber army. Precisely this is the point, are we sure that the group’s operations are so difficult to control or predict? Are we able to mitigate the risks of exposure? […]

Pierluigi Paganini February 10, 2012
Cloud Computing forensic psychological considerations on security

Cloud computing will play an increasingly critical role in the future of the information technology sector, impacting individual consumers, corporations, governments, and international commerce alike. As a forensic psychologist with a national security and law enforcement background, arguably, the design and implementation of cloud computing also involves exposure to multiple security risks at various levels. Understanding the “dark side” of cloud computing at […]

Pierluigi Paganini February 09, 2012
DDoS, IPv6 is an excuse to talk about

The day has come, Network service providers are reporting the first IPV6 distributed denial-of-service (DDoS) attacks and the event is extremly significat from a secutity point of view. The news has been reported in the Arbor Networks’ 7th Annual Worldwide Infrastructure Security Report. Despite this king of attacks remain relatively rare, the news must alert […]

Pierluigi Paganini February 08, 2012
Symantec data leak, too many doubts on the assumption of extortion

The story is familiar to all, the Source Code, the Source code of property of Symantec company has been stolen and it has been object of negotiation between the group of hacker responsible of the crime and law enforcement agents who have acted to protect the company. Conclusion of the negotiation is that the precious […]

Pierluigi Paganini February 06, 2012
Hacking satellite communications and possible implication

Once more to worry about is the real security of satellite infrastructures. In a technological civilization satellites play a vital role in the management and transmission of information of all kinds, satellites infact do the work in silent thet we enjoy every day, but often forget this crucial aspect. Are these powerful systems of communication […]

Pierluigi Paganini February 05, 2012
Anonymous vs FBI, threat or voice to listen?

No doubts about the ability of the Anonymous group since the beginning years have intensified their activities demonstrating great technical skills. As always, the movement gives voice to social dissent and protest against amendments and decisions of governments guilty of not listening to the masses. Among the prominent victims group hacktivist there ‘s the FBI, […]