cyber espionage

Pierluigi Paganini September 18, 2012
State-sponsored attack or not, that’s the question

The defense of cyberspace is becoming one the most concerning question to approach, governments all around the world are massively investing in cyber technology with the resultants that the number of cyber operations is increasing exponentially. William J. Lynn, U.S. Deputy Secretary of Defense, states that: “as a doctrinal matter, the Pentagon has formally recognized cyberspace as a […]

Pierluigi Paganini September 14, 2012
Botnet, pro & cons of using Tor Networks

As declared several time Deep Web, thanks to the anonymity of its connection, provides to cyber criminals an ideal environment to grow up profitable business. We have mainly discussed of deep web such as a portion of cyber space mainly used to sell any kind of good, from malware agent to drugs and other criminal […]

Pierluigi Paganini September 11, 2012
Rapid 7, analysis on data breach incidents

Security Firm Rapid 7 has published an interesting analysis on government data breach reported from January 1, 2009 to May 31, 2012. The document present a worrying scenario in which 268 incidents exposed more than 94 million records containing sensible information. This type of incident is really dangerous due the nature of information exposed that could […]

Pierluigi Paganini September 09, 2012
Elderwood project, who is behind Op. Aurora and ongoing attacks?

Today, I would like to discuss the real effects of a cyber attack. We have recently introduced the direct and indirect effects of several cyber espionage campaigns, such as Flame and Gauss, but we have never approached the problem from a future projection, examining the possible impacts of an incident many years after it. Symantec researchers published an analysis […]

Pierluigi Paganini September 07, 2012
Dangerous waves of malware are transforming cyberspace in a jungle

The cyberspace is becoming a jungle of malware, a place where the danger is just around the corner. Governments, cyber criminals, hacktivist and terrorist are focusing their activities in the new domain due this reason we are assisting to the born of new agents and very sophisticated attack tools. In a parallel manner is lowering […]

Pierluigi Paganini August 31, 2012
Wiper, assumptions and difficulties analyzing a malware

During last April many press agencies and security firms published a story related to the detection of a new malware, named Wiper that attacked computers at businesses throughout Iran. Kaspersky Lab and the International Telecommunications Union (ITU) investigated on the event trying to isolate the malware and analyze it. During the investigation the team of […]

Pierluigi Paganini August 28, 2012
U.S. admit cyber attacks.Who will decide in future conflict,humans or machines?

The U.S. are one of the most advanced country under cyber warfare perspective, we have read a lot on its capabilities and its offensive power, to remark some sample we can remind the plan-X project and the development of the cyber weapon Stuxnet. We all imagine that the U.S. are still really active in the […]

Pierluigi Paganini August 23, 2012
Crisis malware threatens the virtualized environments

This is an hot summer under the malware perspective, we have spoken of new malware for cyber espionage and of new fraud schemas based on malicious software diffusion. Many experts use to avoid malware diffusion making risky navigation and operations in a Virtual environment, a paradigm that is having a great diffusion in the last […]

Pierluigi Paganini August 20, 2012
Social Networks Part 1 – Who exactly are you disclosing your life story to?

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins “Be social” is the buzzword of recent years. No matter whether we are at home, in the gym, at work, or elsewhere, we are haunted by the need to be part of something online. We live alternative online lives, and we have dense networks of […]

Pierluigi Paganini August 19, 2012
Shamoon Malware, cyber espionage tool, cyber weapon or …

Shamoon is a new threat that scares security experts, it can destroy files on a victim’s PC and overwrite the master boot record of its disks. The cyberspace never rests: every time a malware or botnet is detected and neutralized, a new cyber threat arises. The latest to unsettle security experts is called Shamoon, a […]