cyber

Pierluigi Paganini February 27, 2012
Wikileaks & Anonymous, new alliance against dirty affairs

The day has come, WikiLeaks began publishing more than five million emails from Texas-based global security think tank company Stratfor, a global intelligence firm. This time WikiLeaks has chosen a strategic partner, the international Internet hacktivist group of Anonymous, two forces that together are able to frighten the world’s great, the new alliance against dirty affairs. […]

Pierluigi Paganini February 10, 2012
Anonymous, it could become a cyber weapon

The group of hacktivist known as Anonymous is considered as the uncontrollable variable in the cyber space capable of surprising us with striking operations worthy of the most skilled cyber army. Precisely this is the point, are we sure that the group’s operations are so difficult to control or predict? Are we able to mitigate the risks of exposure? […]

Pierluigi Paganini February 10, 2012
Cloud Computing forensic psychological considerations on security

Cloud computing will play an increasingly critical role in the future of the information technology sector, impacting individual consumers, corporations, governments, and international commerce alike. As a forensic psychologist with a national security and law enforcement background, arguably, the design and implementation of cloud computing also involves exposure to multiple security risks at various levels. Understanding the “dark side” of cloud computing at […]

Pierluigi Paganini February 06, 2012
Hacking satellite communications and possible implication

Once more to worry about is the real security of satellite infrastructures. In a technological civilization satellites play a vital role in the management and transmission of information of all kinds, satellites infact do the work in silent thet we enjoy every day, but often forget this crucial aspect. Are these powerful systems of communication […]

Pierluigi Paganini February 01, 2012
New Drive-By Spam Infects unsuspecting users

The threat arrives via email, is now read consuetidine attacks that use email as a vector for spreading malware. Until now we have observed as typical scenario for the contagion an unsuspecting user that clicks on a link in the body of email that started the download of malware or that open the agent directly […]

Pierluigi Paganini February 01, 2012
Cybersecurity market, reflections on the future

Just yesterday I was impressed by a news published on a web site that announced that global cybersecurity market will reach reach quote $61 billion this year, according to a report by UK-based consultancy Visiongain, an impressive amount of money that give an idea of the business. Since now we have analyzed the grows of […]

Pierluigi Paganini January 31, 2012
Stuxnet, are we really safe now? No, of course!

Once again I draw inspiration from the argument “Stuxnet” on which much is being read on the web at this time, and a lot of which will be discussed in the years to come. From all the scientists Stuxnet was defined a deadly weapon, but why  if any direct damages recorded are comparable to those […]

Pierluigi Paganini January 30, 2012
Social Media, exercise or not exercise the control

Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and social media, at the center of heated debates. Always consider myself an avid supporter of freedom of expression and free access to the network, but what I want to do in this post is to […]

Pierluigi Paganini January 29, 2012
Chinese Attacks on Defense Contractors, 2 clues are evidence

It’s not first time and the news itself doesn’t rapresent a surprise, once again Chinese hacker groups are involved in cyber intelligence operations against western companies with the intent to steal critical information. Symantec Researchers have proved the involvement of Chinese groups in attacks alerting the international community regarding the target attacked, including major U.S. defense […]

Pierluigi Paganini January 28, 2012
Malware evolution and the Frankenmalware case

In the last decade we have witnessed an extraordinary evolution of those agents technically defined as the term “malware” in several respects as: functional characteristics developing process distribution channels field of use In the past we used to differenciate the malware in groups whose members were deeply identified by distinct behaviors, hence the origin of […]