Article published on Hakin9 IT Security Magazine “Raspberry Pi Hacking â Exploiting Software” 08/12 The article proposes an analysis of the main cyber threats that worry security experts and that are profoundly changing the cyber space. The exponential growth of the number of cyber threats and attacks is rebutted by a wide range of statistical […]
In these days it has been discussed about a possible Iranian cyber offensive against US banks immediately denied by government of Teheran, the event raised the discussion on the real level of security of banking systems. Financial institutions are considerable privileged targets for a cyber attacks, banking system is a critical asset for a nation […]
The tensions between Iran and Western countries are always in the principal news, the fear for an imminent Israel attack raises many questions regarding the real level of military preparedness of the regime. Many experts have tried to analyzed a possible scenario of the attack, in which the cyber component could assume a strategic importance. […]
Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins We use the Internet on a daily basis to access numerous services available on the web, most of which require a process of identification and validation of a userâs identity, a process commonly defined as Authentication. As Wikipedia states, the […]
Reports from main security firms confirm the increasing growth of cyber attacks based on malware, in particular the large diffusion of Apple products has made them desirable targets. The explosion of malicious agents designed for Apple OS X operating system as surprised Apple users that have found themselves suddenly vulnerable exactly such as users of […]
I’m just returned from the Cyber Threat Summit in Dublin, one of the most interesting European events in cyber security that gave me the opportunity to share opinion notes with expert professionals of international security context. Â The event revealed an alarming scenario on the main cyber threats, no matter if it is cybercrime, hacktivism, cyber […]
System administrators are extremely busy people, so they will be very pleased to know that cloud-based server monitoring solutions can save them a considerable amount of time. In addition to helping you to reduce your heavy workload and be more productive, cloud-based server monitoring can also have a variety of bottom line benefits for companies. […]
In May Iranian Computer Emergency Response Team Coordination CenterLab, Â CrySyS Lab and Kaspersky Lab have published a news regarding a new malware that has been detected and that have hit mainly Windows systems of Middle East area, specifically the Iran. The malware was evidence of a huge ongoing cyber espionage campaign, the level of complexity […]
The defense of cyberspace is becoming one the most concerning question to approach, governments all around the world are massively investing in cyber technology with the resultants that the number of cyber operations is increasing exponentially. William J. Lynn, U.S. Deputy Secretary of Defense, states that: “as a doctrinal matter, the Pentagon has formally recognized cyberspace as a […]
Article Published on The Hacker New Magazine â September Edition âSecurity in a serious wayâ Introduction The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines, according a raw estimation of some security experts clear web represents only a small portion of the […]