APT

Pierluigi Paganini March 27, 2013
First APT attack on Android targeted Tibetan & Uyghur activists

Read about APT attacks has become customary, even easier to hear of attacks against political dissidents or minorities as Tibetan and Uyghur activists, but never before has been exploited the Android platform for this type of offensive. In the past Tibetan minorities have been already targeted with malware able to infect Windows and Mac OSs, […]

Pierluigi Paganini February 07, 2013
Operation Beebus, another chinese cyber espionage campaign

Security Firm FireEye revealed to have discovered an APT campaign targeting companies in the defense and aerospace sector and that has been originated from China to steal intellectual property and industrial secrets from US companies. In this period many other attacks have been linked to China such as the cyber espionage campaign against NYT and […]

Pierluigi Paganini January 05, 2013
Confidential documents from Japanese politics stolen by malware

Last December Japan Aerospace Exploration Agency was hit again by malware  that stolen secret information on newest rockets from an internal computer, it was not first time for the Japanese agency that was already victim of a cyber attack having same purpose, cyber espionage to obtain information on another technological advanced project related to the […]

Pierluigi Paganini October 24, 2012
Trend Micro Q3 security report

Trend Micro has released the report “3Q 2012 SECURITY ROUNDUP -Android Under Siege: Popularity Comes at a Price” that presents a worrying trend for malware growth increased of 483%. The increment include cyber espionage malware and also destructive malicious agents targeting mainly the mobile world and in particular Google Android platform. Malware targeting Android platform increased […]

Pierluigi Paganini April 20, 2012
Cyber threats in mobile environment

Today I desire to share with you the results of a study of Trend Micro security firm focused on mobile threat incidents related to the first quarter of 2012. The large diffusion of mobile devices and the leak of awareness on the principal cyber threats have produced an increasing interest of the cybercrimein mobility sector, […]