Security

Pierluigi Paganini August 15, 2012
#OpTrapWire, Anonymous against surveillance systems

In this days I have written several times regarding surveillance systems and the huge business around it. Private companies, government agencies and cyber units are all working to develop new tools to spy on wide audience. This tools are really attractive for those governments that desire to monitor and pursue dissident, in many cases these […]

Pierluigi Paganini August 14, 2012
Finfisher, the case of a cyber espionage tool found everywhere

Two days ago, reading the news that lawful interception malware FinFisher was discovered in the wild I thought … “wow finally we have the evidence, probably we will debate for a long time regarding the use of this tool and of similar agents” But as fate would have it the same day came the news […]

Pierluigi Paganini August 12, 2012
Understanding risks of different types of Mobile Banking transactions

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins   Many people are inclined to leave the responsibility for personal banking security entirely with the banks. However, this is not a good strategy for many reasons, including: You don’t want malware of ANY sort on your computing device(s) Even […]

Pierluigi Paganini August 10, 2012
Gauss, evidence of ongoing cyber-war and cyber espionage campaigns

As expected a new malware for purposes of cyber espionage was once again identified by the Team of Kaspersky Lab. After Duqu, Flame and Mahdi a new cyber-espionage toolkit has been detected in the same region, the Middle East, and like its predecessor is capable of stealing sensitive data such as online banking credentials, browser passwords and […]

Pierluigi Paganini August 08, 2012
Anonymous Ethical code. Back to the origins

Several months ago I wrote on the future of the famous group of hacktivism, Anonymous explaining that the model the originated the movements was evolving in unpredictable way due the large consensus of the hackers and possible infiltration made by law enforcement and governments. According recent revelation inside the group there are two principal faction, […]

Pierluigi Paganini August 07, 2012
DaVinci code,the surveillance business & eligibility of investigations

No doubts, one of the most advanced cyber threat to the technological evolution is the malware diffusion, we read daily news regarding new unknown agents developed by cybercriminals, governments or hacktivists, but are we really ready to reduce the exposure of our resources? Some weeks ago a news has passed without  too much noise but […]

Pierluigi Paganini August 06, 2012
Phishing the financial and banking seas

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martins, David Pace and Benjamin Gittins Every day the international SWIFT banking network processes financial transactions (relayed between banks) valued at literally trillions of dollars. Today, most of the >1 billion personal computers connected to the Internet are now at least occasionally involved in e-banking, […]

Pierluigi Paganini August 04, 2012
Reuters blogging platform hacked, the critical role of information

In this day my blog has dedicated a great attention to the security of social media, explaining the importance of new communication networks. Today the information is synonymous with power, due this consideration is critical develop the proper processes for its management. To acquire information today we infiltrate social networks, we attack forums and social […]

Pierluigi Paganini August 03, 2012
Facebook, more than 83 million questionable profiles.The poisoned networks

Crazy … a year ago on a warm June evening I began to formalize some ideas on a concept of great relevance today, the “social network poisoning”. I am the person who coined the term, proposing the scientific community with some colleagues who share my ideas as Andrea Zapparoli Manzoni and Kalos Bonasia. Immediately I inserted […]

Pierluigi Paganini August 02, 2012
Malware & cyber espionage, ongoing attacks on sensitive information

Malware once were used primarily to destroy the victim’s PC, but the scenario has completely changed today. While surviving the need of wanting to harm with malicious software, for example in the development of cyber weapons, the current trend is to develop agents that serve primarily to the function of spying. Cybercrime, governments, and groups […]