Security

Pierluigi Paganini May 18, 2012
Syria,uncomfortable assumptions on the control of dissidents

The public opinion is daily informed regarding the situation in Syria that is still critic, according UN representative in the country several clashes are undermining a virtual ceasefire. Deputy Rep to Syria,  Nasser Al-Qudwa, declared : “There is, at least, a theoretical commitment on the part of the Syrian government, and also on the part […]

Pierluigi Paganini May 17, 2012
Zeus P2P variant against Facebook,Hotmail,Yahoo & Google Mail

The experts of Trusteer firm have discovered a new variant Zeus malware responsible of  a series of attacks against principal internet service providers. The variant carried out attacks using the P2P network architecture targeting users of Facebook, Hotmail and Yahoo and  Google Mail. What is Zeus? The Zeus Trojan is one of most notourios malware […]

Pierluigi Paganini May 16, 2012
Has Anonymous infiltrated US Government? The insider issue

In last months we have a long discussed about the security status of US networks and infrastructures, we have described the American cyber strategies and the main action proposed to protect the principal assets of the nations. One story in particular struck us deeply, that relating to the vulnerability of U.S. Government networks for admission […]

Pierluigi Paganini May 15, 2012
2011 IC3 – Internet Crime Report

In this article I desire to discuss about the data provided in the 2011 IC3 Internet Crime Report that provide evidence of the Internet Crime Complaint Center (IC3) against cybercrime in US and of the obtained results. On May 8, 2000 from a partnership between NW3C, BJA and the FBI was born The Internet Fraud Complaint […]

Pierluigi Paganini May 14, 2012
A picture of the Iran threat

The situation in Iran is becoming really critic, time go by and every diplomatic solution is not realizable. We have western countries disturbed by an aggressive policy of the government in Tehran, defiant as ever, that risks trigger a dangerous situation in the Middle East undermining the unstable equilibrium of the whole area. Many time […]

Pierluigi Paganini May 13, 2012
What is a digital signature? Fundamental principles

Private companies and governments agencies all around the word make huge investments for the automation of their processes and in the management of the electronic documentation. The main requirement in the management of digital documentation is its equivalence, from a legal perspective, to paperwork, affixing a signature on a digital document is the fundamental principle […]

Pierluigi Paganini May 12, 2012
The Unknowns, hacker’s revenge in the name of security

It’s happened, another group of hacker named The Unknowns has hacked several organizations, , including NASA and the U.S. Air Force, and posted evidence of their actions. The complete list has been published in a message on PasteBin: NASA – Glenn Research Center US military US AIR FORCE European Space Agency Thai Royal Navy Harvard Renault […]

Pierluigi Paganini May 11, 2012
FBI on Bitcoin,between cybercrime opportunity & digital choice

Law enforcement, FBI first, are worried by the diffusion of the Bitcoin network that could be used by groups of criminals for several activities. The main problem related to the payment system is that is completely anonymous making impossible to trace the transitions and related users. Bitcoin is a decentralized electronic cash system that uses […]

Pierluigi Paganini May 10, 2012
US and China are working for stability in Asia-Pac

In recent days I have discussed the increasing tension between China and the Philippines for a territorial dispute and related effects which have had significant repercussions in cyber space. Just the Asia-Pac region is among those area that are of main concerns in its military and cyber warfare. This time to discuss is the historical […]

Pierluigi Paganini May 09, 2012
NFC, business opportunities, security and privacy issues

The NFC technology Near field communication (NFC) is a set of standards for Smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity. The standard describes a radio technology that allows two devices to communicate at a short distance, no more than a few centimeters, allowing the exchange of […]