• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • GoAnywhere MFT zero-day flaw actively exploited
  • CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers
  • Tallahassee Memorial HealthCare, Florida, has taken IT systems offline after cyberattack
  • Exploitation attempts for Oracle E-Business Suite flaw observed after PoC release
  • VMware Workstation update fixes an arbitrary file deletion bug
  • Atlassian fixed critical authentication vulnerability in Jira Software
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Iran, the cyber threat … are we creating a new enemy ?

"Iran, the super power capable of threatening the world". This is the title of a hypothetical sensationalist article aimed to enhance the computer skills of a nation of which little is known. In recent weeks the strange coincidence of events is helping...

December 24, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Malware  Security 

What should we expect from next cyber weapon? Hypothesis on Stuxnet 3

This 2011 was the year of the consecration of cyber weapons from a mediatic point of view. Awareness of the threat has been shared by all the major states of the world. This weapons could be been used in cyber attacks, claiming victims from cyberspace...

December 23, 2011  By Pierluigi Paganini   Posted In  Hacking  Malware  Security 

Russia, cyber repression in the social networks era

Several times in these posts we have discussed of the importance of social media in recent years. Social Media are the valuable carrier to disclose political decisions taken by central governments. This is well known to the main strategist of governments...

December 22, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Security  Social Networks 

Malware attacks Georgia Hospital, have we learnt the lesson?

The medical industry is historically one of the sectors that has benefited more than others for the introduction of technology. Devices allow ever more complex operations every day to millions of patients and to medical equipments, from health conditions...

December 21, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware  Security 

The thin line between monitoring and censorship

During the last year we have seen the consolidation of the tendency to use social media as a major vector for the exchange of information. The imperative is to be social, no matter if you need to share photos with friends or to express an opinion on a topic...

December 20, 2011  By Pierluigi Paganini   Posted In  Intelligence  Laws and regulations  Security  Social Networks 

Duqu – The worst may still have to come for critical infrastructures

Duqu, a name that we are reading since several months and with whom we have called a malware that scares the scientific community for some features we will shortly describe. I wrote a lot in this blog about Duqu and on more than one occasion we have raised...

December 19, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Hacktivism  Intelligence  Malware  Security 

SCADA and vulnerabilities to critical infrastructures

Over the last few months there have been different events that led to the story than they can be dangerous attacks on SCADA systems used to control production processes in industrial plants of various kinds, from industrial production to the provision...

December 18, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Malware  Security 

Software piracy,from statistics to hypotheses of cyber warfare

With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether software piracy is deliberate or not, it is still illegal and punishable by law. We distinguish several type of software...

December 17, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware  Security 

The year of the networked protest, from SOPA act to Anonymous

It's end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what else will we remember of this 2011? No doubts, we will remember the new way to use Internet, an irreplaceable vector for social protests,...

December 15, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Digital ID  Hacking  Intelligence  Security  Social Networks 

2011, CAs are under attack. Why steal a certificate?

2011 was a terrible year for the certification authorities, the number of successful attacks against some major companies reported is really high and totally out of any prediction. Many attacks have had disturbing consequences.It all began, or so we were...

December 15, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Digital ID  Hacking  Intelligence  Security 


12345Next ›Last »
Page 1 of 1406
  • Digging the Deep Web: Exploring the dark side of the web

    Digging The Deep Web
  • Center for Cyber Security and International Relations Studies

  • Subscribe Security Affairs Newsletter

    newsletter
  • Security Affairs Awarded as Best European Tech blog at European Cybersecurity Blogger Awards

    EU Sec Bloggers Awards 22

Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version