The U.S. are one of the most advanced country under cyber warfare perspective, we have read a lot on its capabilities and its offensive power, to remark some sample we can remind the plan-X project and the development of the cyber weapon Stuxnet. We all imagine that the U.S. are still really active in the […]
This is an hot summer under the malware perspective, we have spoken of new malware for cyber espionage and of new fraud schemas based on malicious software diffusion. Many experts use to avoid malware diffusion making risky navigation and operations in a Virtual environment, a paradigm that is having a great diffusion in the last […]
Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins âBe socialâ is the buzzword of recent years. No matter whether we are at home, in the gym, at work, or elsewhere, we are haunted by the need to be part of something online. We live alternative online lives, and we have dense networks of […]
Shamoon is a new threat that scares security experts, it is able to destroy files on victimâs PC and overwrite the master boot record of its disks. The cyberspace has no peace, every time a malware or a botnet is detected and neutralized a new cyber threat is coming, this time a new agent scare […]
Article Published on The Hacker New Magazine â August Edition âBotnetâ Introduction The nightmare of millions of infected computers synchronized to conduct an attack on specific target finds materialization in the concept of botnet. In the classic architecture each machine, named bot, executes orders sent by a master unit called bootmaster, which can instruct the various […]
Two days ago, reading the news that lawful interception malware FinFisher was discovered in the wild I thought … “wow finally we have the evidence, probably we will debate for a long time regarding the use of this tool and of similar agents” But as fate would have it the same day came the news […]
As expected a new malware for purposes of cyber espionage was once again identified by the Team of Kaspersky Lab. After Duqu, Flame and Mahdi a new cyber-espionage toolkit has been detected in the same region, the Middle East, and like its predecessor is capable of stealing sensitive data such as online banking credentials, browser passwords and […]
Crazy … a year ago on a warm June evening I began to formalize some ideas on a concept of great relevance today, the âsocial network poisoningâ. I am the person who coined the term, proposing the scientific community with some colleagues who share my ideas as Andrea Zapparoli Manzoni and Kalos Bonasia. Immediately I inserted […]
Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by cyber criminals and in cyber attacks during state sponsored operations in cyber warfare scenarios. This malicious software presents a wide range of purposes and functionalities, they are used to steal information or to destroy control […]
This time target of attacks of the Anonymous group is the Australian government, at least 10 websites were taken down to protest proposed changes to privacy laws. The government want to force national ISP to spy on users make available their information to law enforcement and security agencies. The Anonymous Australia collective in a mail […]