backdoor

Pierluigi Paganini August 07, 2012
DaVinci code,the surveillance business & eligibility of investigations

No doubts, one of the most advanced cyber threat to the technological evolution is the malware diffusion, we read daily news regarding new unknown agents developed by cybercriminals, governments or hacktivists, but are we really ready to reduce the exposure of our resources? Some weeks ago a news has passed without  too much noise but […]

Pierluigi Paganini August 01, 2012
Governments are increasing cyber security on social media

Many experts are sure, the new horizons of intelligence are in the social media and in the ability to control them. Governments are more careful on the analysis of social media and the vast amount of information which they hold. Intelligence agencies have learned that Social networks and forums are exceptional instruments for information gathering […]

Pierluigi Paganini July 31, 2012
Rakshasa, is it possible design the perfect hardware backdoor?

Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by cyber criminals and in cyber attacks during state sponsored operations in cyber warfare scenarios. This malicious software presents a wide range of purposes and functionalities, they are used to steal information or to destroy control […]

Pierluigi Paganini July 24, 2012
Skype, Apple, too many doubts about the privacy

We daily assist to continuous violations to user’s privacy, mobile apps that expose its data, communication channels apparently secure that reveals law enforcement interferences or network devices suspected to contains a secret backdoor. The imperative is the monitoring of users, for commercial and national security purposes, we have read in many occasions of the development […]

Pierluigi Paganini July 18, 2012
Mahdi campaign, ongoing cyber-espionage in the Middle East

Again another great investigation of the excellent team of Kaspersky lab and its partner Seculert firm has discovered an ongoing campaign to conduct a large scale infiltration of computer systems in the Middle East area. The campaign has targeted individuals across several states of the area such as Iran, Afghanistan and also Israel. The operation […]

Pierluigi Paganini July 12, 2012
The raise of Multi-platform malware

The malware factory still evolving, every day security firms detect new cyber threats that show new sophisticated techniques to avoid protection systems, this is a war that law enforcement fight against cyber criminals. Internet has a new web exploit produced by crime industry, its particularity is that in the deployment phase it is able to […]

Pierluigi Paganini May 29, 2012
China-made US military chip, security backdoor or debugging functionality?

During last days an insistent news circulated on the internet, a microchip used by the US military and manufactured in China contains a secret “backdoor” that make possible a remote control of the devices. The disclosure is attributed to Cambridge University’s Computing Laboratory, it’s clear the media impact of similar news in security environments, an […]

Pierluigi Paganini May 28, 2012
CIA, FBI, NSA, differents agencies for an unique intent…global monitoring

We have discussed several times regarding the intention of the FBI to create a special unit for internet monitoring and surveillance, a task force established to prevent and fight cyber crimes .In reality the Bureau already has different internal units that work with the same purpose and in the last years has promoted different projects […]

Pierluigi Paganini May 18, 2012
Syria,uncomfortable assumptions on the control of dissidents

The public opinion is daily informed regarding the situation in Syria that is still critic, according UN representative in the country several clashes are undermining a virtual ceasefire. Deputy Rep to Syria,  Nasser Al-Qudwa, declared : “There is, at least, a theoretical commitment on the part of the Syrian government, and also on the part […]

Pierluigi Paganini May 08, 2012
FBI,content monitoring,backdoors & Going Dark…shake well before use

Social Networks represent a rich mine of information of great interest for researchers, cybercriminals and government agencies. Analyzing the networks is possible to track detailed profile of any users, his relationships and his habits, the possibility to exercise the control of social networks is an actual form of power, the power of knowledge. We have […]