Crazy … a year ago on a warm June evening I began to formalize some ideas on a concept of great relevance today, the “social network poisoning”. I am the person who coined the term, proposing the scientific community with some colleagues who share my ideas as Andrea Zapparoli Manzoni and Kalos Bonasia. Immediately I inserted […]
Malware once were used primarily to destroy the victim’s PC, but the scenario has completely changed today. While surviving the need of wanting to harm with malicious software, for example in the development of cyber weapons, the current trend is to develop agents that serve primarily to the function of spying. Cybercrime, governments, and groups […]
Many experts are sure, the new horizons of intelligence are in the social media and in the ability to control them. Governments are more careful on the analysis of social media and the vast amount of information which they hold. Intelligence agencies have learned that Social networks and forums are exceptional instruments for information gathering […]
Browsing the internet is easy to find information regarding date breach by hackers against large companies that fail to protect their facilities exposing the information of their customers and employees. Yesterday Anonymous group has released more than 400K record of the Australian AAPT company stolen during a recent attack, meanwhile this morning I read about […]
Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace The military strategist Carl von Clausewitz stated: “All war presupposes human weakness and seeks to exploit it.” Malicious software (malware) is software that is explicitly designed to exploit vulnerabilities in computing devices and human users to the malicious advantage of the malware […]
The elaboration of a proper cyber strategy is one the main target of intelligence services all around the world. We often discuss of US and Israel, but also European governments are pushing to reinforce their presence in the cyber space. The fear of cyber attacks against critical infrastructures is high, it is a common strategy […]
Article published on The Malta Indipendent Ron Kelson Pierluigi Paganini by Ron Kelson – Vice Chair ICT Gozo Malta Project, Pierluigi Paganini – Director and CISO of Bit4ID, Italy and Benjamin Gittins – CTO Synaptic Laboratories Ltd. Cyber security, civil liberties, our common welfare and the stability of […]
The malware factory still evolving, every day security firms detect new cyber threats that show new sophisticated techniques to avoid protection systems, this is a war that law enforcement fight against cyber criminals. Internet has a new web exploit produced by crime industry, its particularity is that in the deployment phase it is able to […]
The story begins in November 2011 when in Estonia was arrested a group of persons accused of having developed the dreaded trojan that seems to be able to spread with surprising ease building a scary botnet. The botnet operated by Rove Digital altered user DNS settings, pointing victims to malicious DNS in data centers in […]
On June 28th, a FBI official declared before a House panel that the phenomenon of cyber espionage is increasing with an alarming trend. We are living a period of great crisis and the intellectual property is becoming a privileged target for cyber attacks. It has been estimated that the economic espionage in the current fiscal […]