Security

Pierluigi Paganini July 12, 2012
The raise of Multi-platform malware

The malware factory still evolving, every day security firms detect new cyber threats that show new sophisticated techniques to avoid protection systems, this is a war that law enforcement fight against cyber criminals. Internet has a new web exploit produced by crime industry, its particularity is that in the deployment phase it is able to […]

Pierluigi Paganini July 11, 2012
Anonymous #OpPedoChat pros and cons of a noble battle

The hacktivists of Anonymous are always on and always operating despite many experts continue to downplay the importance and effectiveness of its operations. In recent days the name of the collective was involved in a clamorous revelations for his contribution in the dissemination of precious “Syria Files” a collection of correspondences that detect uncomfortable murky […]

Pierluigi Paganini July 10, 2012
Syria Files, Wikileaks, Anonymous and dirty affairs

Big outcry on Wikileaks that last week has published more that 2.4 million emails allegedly obtained from continuous hack against Syrian government and organizations connected to the regime. The correspondence of “Syrian political figures, ministries and associated companies” between August 2006 and March 2012 has been defined embarrassing for the government of Damascus and its […]

Pierluigi Paganini July 09, 2012
Cyberoam DPI vulnerability scares Tor

Last week, on blog.torproject.org was published the news relative to a security vulnerability found in Cyberoam DPI devices (CVE-2012-3372). All is started when a user in Jordan reported seeing a fake certificate to torproject.org. The certificate was issued by Cyberoam companies and the researchers of the Tor project believed that the CA has been tricked  […]

Pierluigi Paganini July 08, 2012
ICS-CERT report, a worrying increase of cyber attacks

It’s been long debated the need to protect critical infrastructures from cyber attacks, cyber threats could hit foreign countries causing loss of human lives identically to a conventional attack. Don’t forget that similar attacks con be organized by state-sponsored hackers or cyber criminals with the different purposes, target destroying or cyber espionage. Emergency Response Teams […]

Pierluigi Paganini July 07, 2012
DNSChanger, July 9th is arrived!

The story begins in November 2011 when in Estonia was arrested a group of persons accused of having developed the dreaded trojan that seems to be able to spread with surprising ease building a scary botnet. The botnet operated by Rove Digital altered user DNS settings, pointing victims to malicious DNS in data centers in […]

Pierluigi Paganini July 06, 2012
A view on the economic impact of cyber attacks, from US to China

On June 28th, a FBI official declared before a House panel that the phenomenon of cyber espionage is increasing with an alarming trend. We are living a period of great crisis and the intellectual property is becoming a privileged target for cyber attacks. It has been estimated that the economic espionage in the current fiscal […]

Pierluigi Paganini July 05, 2012
Who really takes advantage of the operations of Anonymous?

I desire to tribute another article to the group that catch the  worldwide attention of security community, Anonymous. Few years to consolidate its image become one of the most debated phenomenon on internet, many consider the collective a threat, many other the expression of a dissent to listen. Both interpretations are correct, but let’s think […]

Pierluigi Paganini July 04, 2012
Citadel trojan, migration of cybercrime to the deep web

We all remember the Citadel trojan, based on  the Zeus experience has evolved becoming one of the most interesting cyber criminal project. Few months ago I wrote on the excellent customer relationship management (CRM) model implemented by its creators. Thanks a malware evolution dictated by market needs, the trojan has evolved in time, many instances […]

Pierluigi Paganini July 03, 2012
Hacktivism and Deep Web

  In today’s society technology plays a crucial role and is used as a new cultural vehicle, and even aggregation element or carrier to express dissent against the policies of governments and private companies. Groups such as Anonymous are maximum expression of a phenomenon defined “Hacktivism” that refers the usage of computers and computer networks […]