Article published on The Malta Indipendent   Ron Kelson                  Pierluigi Paganini by Ron Kelson – Vice Chair ICT Gozo Malta Project, Pierluigi Paganini â Director and CISO of Bit4ID, Italy and Benjamin Gittins – CTO Synaptic Laboratories Ltd. Cyber security, civil liberties, our common welfare and the stability of […]
In the last decade we have observed the raise of cyber attacks, no matter their purpose, cyber warfare or cyber espionage for military or private business, they have demonstrated how much dangerous is a cyber offensive. The U.S.’s leading cyberwarrior has estimated that private businesses are losing hundreds of billions to cyber espionage and cybercrimes, […]
Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, David Pace The London 2012 Olympics will bring together 10,500 athletes, diplomats, politicians, business leaders and millions of spectators from all over the world. Behind the scenes there is an immense effort being made to ensure the security and well-being of everyone participating, in any […]
Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 06 2012 The article exposes the main issues related to the use of SCADA systems in critical infrastructures, providing a careful analysis of the relative level of security on a global scale. It discusses the main vulnerabilities of critical systems exploitable by cyber […]
It’s hacking time! Within a few days we saw two attacks that had disastrous consequences, the victims are prominent Formspring portal and the Yahoo Voices service. The Yahoo branch hacked is Yahoo Contributor Network a sort  of content farm that paid users to publish their submissions. The Yahoo service allow users to post articles and media such […]
The malware factory still evolving, every day security firms detect new cyber threats that show new sophisticated techniques to avoid protection systems, this is a war that law enforcement fight against cyber criminals. Internet has a new web exploit produced by crime industry, its particularity is that in the deployment phase it is able to […]
The hacktivists of Anonymous are always on and always operating despite many experts continue to downplay the importance and effectiveness of its operations. In recent days the name of the collective was involved in a clamorous revelations for his contribution in the dissemination of precious “Syria Files” a collection of correspondences that detect uncomfortable murky […]
Big outcry on Wikileaks that last week has published more that 2.4 million emails allegedly obtained from continuous hack against Syrian government and organizations connected to the regime. The correspondence of âSyrian political figures, ministries and associated companiesâ between August 2006 and March 2012 has been defined embarrassing for the government of Damascus and its […]
Last week, on blog.torproject.org was published the news relative to a security vulnerability found in Cyberoam DPI devices (CVE-2012-3372). All is started when a user in Jordan reported seeing a fake certificate to torproject.org. The certificate was issued by Cyberoam companies and the researchers of the Tor project believed that the CA has been tricked […]
It’s been long debated the need to protect critical infrastructures from cyber attacks, cyber threats could hit foreign countries causing loss of human lives identically to a conventional attack. Donât forget that similar attacks con be organized by state-sponsored hackers or cyber criminals with the different purposes, target destroying or cyber espionage. Emergency Response Teams […]