In recent years we are assisting to a profoundly change in the nature of malware, it is increased the development for spy purposes, for its spread in both private and government sectors. The recent case of Flame malware has demonstrated the efficiency of a malicious agent as a gathering tool in a typical context of […]
We live in the cyber era, governments measure their capabilities in the cyberspace with reciprocal attacks of increasing complexity.Every government is developing an adequate cyber strategy investing huge quantity of money in the establishment of cyber units, on formation of groups of cyber experts and on the development of new cyber weapons. In this scenario […]
Money motivates the cyber assault to banking by cybercrime, but the finance world is also considered a privileged target for sponsored-state attacks as part of cyber offense strategies. Let’s consider that the banking world is profoundly changing, the introduction of mobile devices, social networks, the openess to web services, the coming of new technologies such […]
We clarified the use of anonymizing networks is not only related to criminal intents, they represent in fact a powerful instrument to elude censorship introduced by governments in critical areas of the planet. We have provided the examples of Syria and Iran, but the world is full of similar operations that introduce a detailed […]
Zeus is one of the longest-running malware that raged for months, appearing in various forms on the web thanks to the continuous changes made by the cybercrime industry. This time the news is really interesting, Symantec security researchers have detected a new variant of Zeus that not relies on command and control (C&C) servers for […]
Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, David Pace In last week’s article, we explored the issue of today’s high-speed computers and why their inability to consistently meet software deadlines causes serious problems to automotive applications, industrial control systems, (nuclear) power generators and other computer systems that interact with the real world. […]
Article published on The Malta Indipendent Convergence in world leading research in Europe to tackle these problems This the first part of a two-part mini-series in which we look at the safety (and security) problems in real-time cyber-physical systems used around the world Ron Kelson, Pierluigi Paganini, David Pace, Benjamin Gittins Modern computer chips… a marvel of […]
Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of malicious software designed with the purpose to disrupt computer operation, gather sensitive information, or gain unauthorized access to victims systems. With the term we indicate in fact several types of malicious code such as computer […]
The Flame case has raised the question on the real cyber warfare capabilities of every country, we have spoken of the strong commitment of Indian and German government, praising the US capabilities for the involvement in operations such as the “Olympic Games” project. But what are the real cyber capabilities of the United States? No […]
The demand of anonymity services is increased in response to the increase network monitoring and censorship,but the anonymity is a concept that induces fear. Everyday, all our web actions leave traces of ourselves and of our way of life through the storing of massive amounts of personal data in databases in the internet, all these information […]