Google

Pierluigi Paganini October 22, 2012
How much do you know on search engines? Quis Custodiet Ipsos Custodes?

Article published on The Malta Indipendent on October 21th 2012 Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins Every day billions of people submit an unimaginable number of queries through Internet search engines.  These powerful instruments have profoundly changed the user’s perception of web content. Before  search engine popularity, “web portals”, like “DMOZ  Open […]

Pierluigi Paganini October 04, 2012
New cyber attacks have caused serious damage to Internet connection in Iran

High tension in the cyberspace, recently a series of attacks have hit oil companies and also banking and Iran was blamed for most of them. This time the scenario appears overturned, according a news published few hours ago a huge cyber attack have targeted Iranian infrastructure and communications companies, causing serious damages to Internet connection. […]

Pierluigi Paganini September 09, 2012
Elderwood project, who is behind Op. Aurora and ongoing attacks?

Today I desire to discuss on the real effect of a cyber attack, we have recently introduced the direct and indirect effects of the several cyber espionage campaigns discovered such as Flame and Gauss, but we never approached the problem in future projection examining the possible impacts of an incident many years after it. Symantec […]

Pierluigi Paganini June 09, 2012
Google Online Security against state-sponsored attacks

According to a post of Eric Grosse, VP of security engineering at Google, on Google Online Security blog the company is constantly monitoring the web for malicious activity on its systems, with particular attention to attacks made by third parties to illegally access into users’ accounts. Google declared that is ready to adopt measurements to mitigate […]

Pierluigi Paganini May 17, 2012
Zeus P2P variant against Facebook,Hotmail,Yahoo & Google Mail

The experts of Trusteer firm have discovered a new variant Zeus malware responsible of  a series of attacks against principal internet service providers. The variant carried out attacks using the P2P network architecture targeting users of Facebook, Hotmail and Yahoo and  Google Mail. What is Zeus? The Zeus Trojan is one of most notourios malware […]

Pierluigi Paganini May 08, 2012
FBI,content monitoring,backdoors & Going Dark…shake well before use

Social Networks represent a rich mine of information of great interest for researchers, cybercriminals and government agencies. Analyzing the networks is possible to track detailed profile of any users, his relationships and his habits, the possibility to exercise the control of social networks is an actual form of power, the power of knowledge. We have […]

Pierluigi Paganini April 29, 2012
Google used as cyber weapon. New attack method found

True, sometimes the big discoveries are the daughters of the case. That’s what happened to Panos Ipeirotis, a researcher of the New York University, he has discovered a new technique of attack on his Amazon web service using Google Spreadsheets. The methods of attack is a DDoS type and the researcher has named it as Denial of […]

Pierluigi Paganini March 02, 2012
Thin line between advertising and violated privacy

We live in an information age in which contemporary society is like a sponge that produces and consumes extraordinary amounts of information, at this time the new power is the detention of the most data on whatever is around us. The technological processes of the last decade have influenced, as never before, the experience of […]

Pierluigi Paganini March 01, 2012
Windows 8 and Android kill switch, threats to privacy

The news is sensational and is associated with the imminent spread of the new operating system from Microsoft, Windows 8. The Redmond has announced in its systems the presence of a “kill switch” feature, a system that allows the company to remotely access the terminal to proceed with the killing of processes that could cause […]

Pierluigi Paganini February 21, 2012
Google code used to circumvent privacy protections … true or false?

The Wall Street Journal in recent days has published a report on the activities of the Google company against Apple’s users using the Safari browser installed on all products of the company (Mac, iPhone and iPad). It was discovered a mechanism by which Google traced and memorized every online user’s action through cookies, circumventing the […]