Verizon Data Breach Investigation Report 2014, to better understand how attackers can affect company business, and learn the proper countermeasures. Verizon firm provided the first data related to its annual report titled Verizon’s 2014 Data Breach Investigations Report (DBIR). The document reports specific sections around common incident patterns covering the bad actors, the techniques used, targets hit, timelines […]
The German Aerospace Center was victim of a cyberespionage attack, many computers have been infected by sophisticated Trojans and other spyware. Cyber espionage is considerable today one of the most alarming cyber threats for governments and private industries, a growing number of attacks has the primary purpose to steal sensitive information like secret documents and […]
Network security engineer “Richee” explained how to use a Raspberry Pi to realize a physical backdoor to gain remote access to an office network. Network security engineer “Richee” published an interesting post on how to use a tiny Raspberry Pi computer to obtain physical access into a corporate network. I decided to publish this post because […]
Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by cyber criminals and in cyber attacks during state sponsored operations in cyber warfare scenarios. This malicious software presents a wide range of purposes and functionalities, they are used to steal information or to destroy control […]
Article published on The Malta Indipendent by Ron Kelson – Vice Chair ICT Gozo Malta Project, Pierluigi Paganini – Director and CISO of Bit4ID, Italy and Benjamin Gittins – CTO Synaptic Laboratories Ltd. Mobile phones were once the status symbols of high-flying business executives. Today, mobile phones have become an essential part of our day-to-day lives. […]
There isn’t peace for social network platforms, priority target for cybercrime and governments, they represent a mine of data useful for business and espionage. After the news of the LinkedIN hack, also Twitter have been successfully attacked by a group of hacktivist named LulzSec Reborn that has leaked user credentials of more of 10,000 accounts. […]
Recent events have demonstrated the strategic importance of the cyber strategy the needs to chair the cyber space, many experts sustains that the cyber war era is just begun, due this reason the Pentagon is involving the private companies, universities and even computer-game companies to develop technologies to improve its cyber warfare capabilities. Events such […]
Tor Metrics Cyber intelligence units are working to develop tools and applications for a deep inspection of the hidden web with the intent of steal classified secret documents of a potential adversary and to maintain the control over cybercrime and terrorists activities and communications. Let’s start from the beginning, which are the available metrics to […]
In this article I desire to discuss about many personal doubts and beliefs regarding the Flame malware, first my idea that we are facing with a new powerful cyber weapon. In the same hours the Iranian Computer Emergency Response Team Coordination CenterLab, CrySyS Lab and Kaspersky Lab have published news regarding the new malware that […]
During last days an insistent news circulated on the internet, a microchip used by the US military and manufactured in China contains a secret “backdoor” that make possible a remote control of the devices. The disclosure is attributed to Cambridge University’s Computing Laboratory, it’s clear the media impact of similar news in security environments, an […]