According last report published by The European Network and Information Security Agency (ENISA)  âENISA Threat Landscape â Responding to the Evolving Threat Environmentâ that summarizes principal cyber threats, critical infrastructures represent privileged targets for emerging trends. Different agents such as terrorists, state-sponsored hackers or hacktivists could be interested in attack control systems within a critical […]
Zeus, a name that security experts know very well, it’s one of the most prolific and dangerous malware of the history. In the years several versions have been detected, it’s one of the first malware for which it has been applied an excellent business model that made possible its evolution in cybercrime, unique constant is the […]
The large diffusion of new services on mobile platforms and social networks was accompanied with a sensible increase of cyber crimes, mainly of identity theft. The US nonprofit consumer watchdog organization Consumer Reports has recently spread an alert on online purchases benefiting of Cyber Monday sales and more in general of discounts for this holiday […]
The numerous attacks and data breaches occurred during the last 12 months demonstrated that despite high attentions in security the principal causes of the incidents are leak of authentication processes, absence of input validation on principal applications and of course the human factor is among the main accused. Last year different data breaches exposed millions […]
Last month I attended the Cyber Threat Summit in Dublin and I had the opportunity to assist to the interesting presentation “Humans The weakest link in cyber security” of Mark Johnson, Chairman, The Risk Management Group. The topic of presentation is one of the most interesting in cyber security, the massive introduction of technologies in […]
In these days it has been discussed about a possible Iranian cyber offensive against US banks immediately denied by government of Teheran, the event raised the discussion on the real level of security of banking systems. Financial institutions are considerable privileged targets for a cyber attacks, banking system is a critical asset for a nation […]
Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins We use the Internet on a daily basis to access numerous services available on the web, most of which require a process of identification and validation of a userâs identity, a process commonly defined as Authentication. As Wikipedia states, the […]
Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our previous articles we discussed malware, phishing, viruses and other computer infections designed to maliciously acquire your personal information. Last week we talked about low privacy settings on social networks, today we will talk about weak passwords. Most people […]
The news has creating great surprise in the security community, a group of computer scientist has declared that has cracked the RSA SecurID encryption model. The news is sensational due the large diffusion of the tokens for the implementation of PKI infrastructures in both private and government sectors. RSA SecurID, is a mechanism developed by […]
There isnât peace for social network platforms, priority target for cybercrime and governments, they represent a mine of data useful for business and espionage. After the news of the LinkedIN hack, also Twitter have been successfully attacked by a group of hacktivist named LulzSec Reborn that has leaked user credentials of more of 10,000 accounts. […]