Security

Pierluigi Paganini December 04, 2011
Stuxnet, Duqu & Conficker, a new generation of cyber weapons … even “without a father”

Cyber warfare expert John Bumgarner claims that the Stuxnet and Duqu virus have been active for much longer than previously suspected, he says that they are active in different variant since 2006. Precisely he claims that the Stuxnet computer virus is linked to Conficker, a mysterious “worm” that surfaced in late 2008 and infected millions […]

Pierluigi Paganini December 03, 2011
Cybercrime, an industry that knows no crisis

  During this days I had the opportunity to read the results of a couple of surveys: The PricewaterhouseCoopers (PwC). Its Global Economic Crime Survey has demonstrated that Cybercrime has double digit growth being today third biggest crime threat in UK businesses behind asset theft crimes, frauds and corruption Norton Cybercrime Report: The Human Impact, an groundbreaking study […]

Pierluigi Paganini December 02, 2011
Social Network Poisoning … they want to spy on us, we evade

Social Network Poisoning term refers the effect produced by the application of methods designed to make unreliable the knowledge related to a profile and its relationships. “Be Social” is the imperative of the last years. We live alternative lives, we have dense networks of relationships, we feel the irrepressible urge to be part of a group, to fill the void that we carry within. But this human propensity to aggregation is now the foundation of the […]

Pierluigi Paganini December 02, 2011
Assange, Spy Files and uncomfortable truths

If we talk about security which could be our worst nightmare? My answer is “to be vulnerable in every moment of our day, whatever we are doing and wherever we are” How could this happen? Imagine that someone has installed an app on our phones, and he is able to stalk us, to know our […]

Pierluigi Paganini December 01, 2011
“Mobile” intrigue … A prying eyes to carry around …

Let we use these ingredients to start some serious reflection on safety issues related to mobile devices: Robust growth in the mobile market, accompanied by technological advances that have made ​​these devices real PC. No awareness of those who use mobile terminals in relation to threats that they face. 2011 years of overtaking sales of […]

Pierluigi Paganini November 29, 2011
From printers to ovens … next step hack our brains.

Are we able to ensure that every peripherals connected to our computers and present in our offices is proof of attack? The first answer will be … “sure”.  We observe same problem with our household appliance that are being more intelligent. The evolution of automation and technology push in the direction of making each device available on the network. This is open up new and interesting  hacking scenarios.  In this days I have read a news on a web […]

Pierluigi Paganini November 28, 2011
Cryptome, social networks and the inconvenient truth

Cryptome, known as Wikileaks’s competitor site  has published  online several reserved documents revealing that the police have access to information of social networks.  The documents describe how the police is able to access to Facebook user information or to the services provided by companies such as AOL and Microsoft. On Cryptome site are also available some guides that explains to cops how to investigate on a person who has used the Yahoo! Messenger. The […]

Pierluigi Paganini November 27, 2011
E-Corruption … “who controls the controller?”

The control of information is the main concern of Governments. More or less declared the major players of a precarious global economy have implemented digital surveillance systems, from India to China, passing Russia and USA. The crucial point is the legality of these actions conducted  by Intelligence Agencies in the name of Nations Security abusing the rights of citizens.  To this we must consider another  significant issue , the corruption.  Corruption has no Country and is a cross problem […]

Pierluigi Paganini November 26, 2011
Cloud…a long journey towards a secure paradigm

When I discussed with many colleagues regarding cloud paradigm most of them smiled declaring that we face yet another found marketing to sell a methodology, known for at least a decade, under new and more appealing clothes. Indeed many of the concepts behind the cloud  approach have little innovative, but the evolutionary push to the […]