search

Date range
Filters

1197 results

Pierluigi Paganini March 14, 2015
A new EU counter-terrorism unit will tackle extremists online

The Eu plans for a new European counter-terrorism unit that  will tackle extremists online in a joint effort of law enforcement from various states. Terrorists are exploiting the web for propaganda purpose and to menace the Western infidels for this reason intelligence agencies and law enforcement need to increase their efforts to tackle any kind of extremist […]

Pierluigi Paganini March 12, 2015
EquationDrug, the hacking platform of the Equation Group APT

Experts at Kaspersky Lab published a detailed analysis of the EquationDrug platform and its modules developed by the Equation Group APT. Recently experts at Kaspersky Lab have uncovered the Equation Group hacking crew, the most sophisticated ever APT. Security researchers at Kaspersky Lab revealed that the capabilities of the Equation Group surpass anything known in […]

Pierluigi Paganini March 10, 2015
Information Warfare – Iran vs America. Why buy a weapon when I have a keyboard?

A newly disclosed secret report illustrates the tightening of cyber dispute between the United States and Iran , both for spying and sabotage. Since Robert Tappan Morris in 1988 created the first worm, cyberspace started to change its virtual state in a critical cyberwar field.  Even if the first worm was an error, aimed at […]

Pierluigi Paganini March 10, 2015
Cyber Experts in North Korea Target the West and Especially Infrastructure of Critical Importance

North Korea holds an impressive army of cyber warriors, with over 3,000 sophisticated professionals. According to the claims of people who have escaped to South Korea, their main target is none other than Western infrastructure of critical value. Over 3,000 cyber experts have been recruited by North Korea, in the country’s attempt to harm the […]

Pierluigi Paganini March 06, 2015
Cleaning up the Cyber Mess: Adopting Cyber Hygiene principles

The increasing number of cyber incidents along with a significant improvement of TTP adopted by threat actors requests the adoption of a cyber hygiene. The rate of data breaches are increasing drastically throughout the year. Cyber-attacks could cause severe disruption to a company’s business functions or operational supply chain, impact reputation, compromise customer information or […]

Pierluigi Paganini March 04, 2015
Twitter locked down Tor by requiring a phone number for sign-up

Internet users that want to create a new account on Twitter through the Tor network must now provide a phone number to verify their identity. A few days ago, Twitter announced plans to begin tracking users via their mobile phone number, a measure that the company consider necessary in order to fight the trolls. Following the […]

Pierluigi Paganini March 02, 2015
Hacking the hackers : A cyber resilience approach

A cyber resilience approach: the need to become cyber resilient is very essential because eliminating risks completely is impossible. Hacking emerged as a geeky, tech-oriented culture that was a little mischievous, but ultimately was about programming and finding faults or bugs in the code. It has evolved over time to become a criminal activity. The […]

Pierluigi Paganini March 02, 2015
Facebook Policies and New Terms of Use Have Been under Scrutiny in Europe

A recent report about the privacy policy of Facebook has shed light to potential problems and disagreements with legal concerns in the EU. There is a recent report from Belgium focusing on the revised terms of use that have to do with Facebook. Due to its enormous popularity even apart from the fact that it’s […]

Pierluigi Paganini February 27, 2015
Tor Browser 4_0_4 Release improves security and privacy

The Tor Project has announced a new version of Tor Browser Bundle, Tor version 4.0.4, that improves privacy and security features. The Tor Project has announced a new release of the Tor Browser Bundle, Tor Browser version 4.0.4, that improves privacy and security features implemented by the popular anonymizing software. The Tor Browser is used by Internet users […]

Pierluigi Paganini February 24, 2015
Experts discovered other applications using the same Superfish Komodia library

Experts at Facebook have discovered at least ten more applications using the Komodia library that allows Superfish adware traffic hijacking capabilities. Matt Richard security researcher from Facebook revealed that The Social Network has discovered at least ten more software applications using the Komodia library that allow Superfish adware traffic hijacking capabilities. Komodia installs a self-signed […]