Google is a mine of information that could be used for various purposes, for this reason National Security Agency realized a book to help its spies uncover intelligence hiding on the web. Few days ago I published an interested article inspired by security expert Dancho Danchev and focused on the use of Google Dorks based tool […]
A new version of DIY Google Dorks based hacking tool has been released, it is an extremely useful tool for reconnaissance of targets. A Webroot blog post announced that a new version of DIY Google Dorks based hacking tool has been released in the wild and it could be used for mass website analysis, the […]
As usual I was reading the news on The Hacker New security portal when a post attracted my attention, another security issue related to an IT giant, Google. The Indian penetration tester Ansuman Samantaray discovered a security flaw in Google drive that exposes millions of Google users to threat of phishing attacks. Too bad that Google […]
I consider the Government surveillance one of the most interesting security topic, the possibility legally and not to interfere with digital experience of its citizens. In many cases governments for various reasons, such as homeland security, spy on users tracking their operations on internet, intercept their communications and access to mail accounts. The phenomenon is […]
Article published on The Malta Indipendent on October 21th 2012 Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins Every day billions of people submit an unimaginable number of queries through Internet search engines. These powerful instruments have profoundly changed the user’s perception of web content. Before search engine popularity, “web portals”, like “DMOZ Open […]
High tension in the cyberspace, recently a series of attacks have hit oil companies and also banking and Iran was blamed for most of them. This time the scenario appears overturned, according a news published few hours ago a huge cyber attack have targeted Iranian infrastructure and communications companies, causing serious damages to Internet connection. […]
Today I desire to discuss on the real effect of a cyber attack, we have recently introduced the direct and indirect effects of the several cyber espionage campaigns discovered such as Flame and Gauss, but we never approached the problem in future projection examining the possible impacts of an incident many years after it. Symantec […]
According to a post of Eric Grosse, VP of security engineering at Google, on Google Online Security blog the company is constantly monitoring the web for malicious activity on its systems, with particular attention to attacks made by third parties to illegally access into users’ accounts. Google declared that is ready to adopt measurements to mitigate […]
The experts of Trusteer firm have discovered a new variant Zeus malware responsible of a series of attacks against principal internet service providers. The variant carried out attacks using the P2P network architecture targeting users of Facebook, Hotmail and Yahoo and Google Mail. What is Zeus? The Zeus Trojan is one of most notourios malware […]
Social Networks represent a rich mine of information of great interest for researchers, cybercriminals and government agencies. Analyzing the networks is possible to track detailed profile of any users, his relationships and his habits, the possibility to exercise the control of social networks is an actual form of power, the power of knowledge. We have […]