Last month I attended the Cyber Threat Summit in Dublin and I had the opportunity to assist to the interesting presentation “Humans The weakest link in cyber security” of Mark Johnson, Chairman, The Risk Management Group. The topic of presentation is one of the most interesting in cyber security, the massive introduction of technologies in […]
The news is circulating on internet creating great concern, once again Chinese hackers have hit an infrastructure of a foreign state, once again we are speaking of cyber espionage but this time the victim is excellent because they were able to access the White House Military Office. The Washington Free Beacon announced the cyber attack […]
It’s known that military sector represents a privileged incubator for new technologies than in many cases are subsequently used in civil. The mobile sector represents one of the most vulnerable environments due the lack of awareness on cyber threats and the increasing number of malware that are affecting devices devoid of any defense system. These […]
It’s happened again, cyber criminals have stolen digital certificates related to companies recognized reliable to sign malicious code. This time the victim is Adobe and according its security chief, Brad Arkin, a group of hackers have signed malware using Adobe digital certificate obtained compromising a vulnerable build server that was used to get code validation […]
Last Wednesday the web site of U.S. Bank has been hit by a DDoS attack, that caused its block, launched by a group of Islamic hacktivists who have claimed responsibility for event. The web site remained down for an hour, starting at around 3:30 Pacific, due the impossibility to serve the huge quantity of requests. […]
Since last month a new campaign of cyber attacks have hit the Energy sector, all is started with the incidents to Saudi Aramco and RasGas companies, in both cases a malware infected internal networks without impacting on the production systems. Due the nature of the targets, the mode of attack and the specific malware behavior […]
Article published on Hakin9 IT Security Magazine “Raspberry Pi Hacking – Exploiting Software” 08/12 The article proposes an analysis of the main cyber threats that worry security experts and that are profoundly changing the cyber space. The exponential growth of the number of cyber threats and attacks is rebutted by a wide range of statistical […]
In these days it has been discussed about a possible Iranian cyber offensive against US banks immediately denied by government of Teheran, the event raised the discussion on the real level of security of banking systems. Financial institutions are considerable privileged targets for a cyber attacks, banking system is a critical asset for a nation […]
The tensions between Iran and Western countries are always in the principal news, the fear for an imminent Israel attack raises many questions regarding the real level of military preparedness of the regime. Many experts have tried to analyzed a possible scenario of the attack, in which the cyber component could assume a strategic importance. […]
Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins We use the Internet on a daily basis to access numerous services available on the web, most of which require a process of identification and validation of a user’s identity, a process commonly defined as Authentication. As Wikipedia states, the […]