Espionage

Pierluigi Paganini February 14, 2012
Nortel, from industrial espionage to bankruptcy

By now the news of successful attacks perpetrated against private companies are no more surprising except sometimes for inefficiency of the implemented security policies . The Wall Street Journal has reported the news that the telecoms company Nortel Networks has been repeatedly exploited by Chinese hackers for a long time, almost a decade. The former Nortel […]

Pierluigi Paganini February 13, 2012
Iran case … security threat and oil business

At this time we are seeing continuing propaganda operations of Iranian government that is trying to convince with its proclamations the public opinion regarding technical capacities in its possession. Military troops, nuclear weapons, and a cyber army ready to destroy any enemy stronghold in cyber space. Too much experts believe that in reality, the West rather […]

Pierluigi Paganini February 10, 2012
Anonymous, it could become a cyber weapon

The group of hacktivist known as Anonymous is considered as the uncontrollable variable in the cyber space capable of surprising us with striking operations worthy of the most skilled cyber army. Precisely this is the point, are we sure that the group’s operations are so difficult to control or predict? Are we able to mitigate the risks of exposure? […]

Pierluigi Paganini February 04, 2012
Underestimate the threat, a serious error

In recent years it has fully understood the offensive capability of the use of cyber weapons, highly efficient tools to move attacks and espionage operations in total coverage. The effectiveness of the cyber threat is linked not only to its intrinsic characteristics, but also to the choice of channel for its spread and in this […]

Pierluigi Paganini February 03, 2012
VeriSign Hacked. Why?

No peace in the cyber space, day after day we read that the computer systems for major corporations and governments are compromised due repeated cyber attacks. This time it was the prestigious Verisign, a name that is our mind we link to the concept of “strong security”, but we are learning that the total security […]

Pierluigi Paganini February 02, 2012
Terrorism acts vs cyber threats, new offense scenarios

We are at an historical turning point today in U.S., and the situation is similar all over the world, threat of terrorist acts have been surpassed by cyber threats, this is the opinion of FBI Director Robert Mueller. Cyber crime, cyber-espionage, massive attacks, hacktivism, usage of cyber weapons against critical infrastructure are all phenomena that are increasing in frequency […]

Pierluigi Paganini January 31, 2012
Stuxnet, are we really safe now? No, of course!

Once again I draw inspiration from the argument “Stuxnet” on which much is being read on the web at this time, and a lot of which will be discussed in the years to come. From all the scientists Stuxnet was defined a deadly weapon, but why  if any direct damages recorded are comparable to those […]

Pierluigi Paganini January 30, 2012
Social Media, exercise or not exercise the control

Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and social media, at the center of heated debates. Always consider myself an avid supporter of freedom of expression and free access to the network, but what I want to do in this post is to […]

Pierluigi Paganini January 29, 2012
Chinese Attacks on Defense Contractors, 2 clues are evidence

It’s not first time and the news itself doesn’t rapresent a surprise, once again Chinese hacker groups are involved in cyber intelligence operations against western companies with the intent to steal critical information. Symantec Researchers have proved the involvement of Chinese groups in attacks alerting the international community regarding the target attacked, including major U.S. defense […]

Pierluigi Paganini January 27, 2012
Cyber ​​chess, a game just begun

So far this year we have witnessed an escalation of attacks against those who are considered the major superpowers on cyber warfare, U.S. and Israel. Real motivated attacks in cyberspace capable of paralyzing the critical services of the target countries and after this offensive is lawful expect a reply first under warfare matter and of […]