Several times I wrote on cybercrime trying to analyze a phenomenon that grows with an impressive rhythm. The trend is uniform all over the word, cybercrime business is increasing its profits despite the economic crisis. The impact of cybercrime is transversal, industry, private businesses and governments, are all players that suffers the incoming cyber threats. […]
A new cyber attack against Iran, in particular this time the Oil Industry was the target of a Malware Attack. The news was widespread by Officials in the Iranian oil ministry, they say that their network and the country’s main oil export terminal were infected with a malware; due this event the government has taken […]
The article is published on the last edition of PenTest AUDITING & STANDARDS 03 2012. Several reports published in the last months demonstrate that Cybercrime has double digit growth, being today among the four biggest crime threat all over the world, within asset theft crimes, frauds and corruption. The trend is the same all over the word, […]
Yesterday I discussed with a friend and colleague Francesco on the lack of awareness of Apple’s users on malware that plague products of the house in Cupertino. This consideration is one of the reasons of the success in malware development for Apple, the users totally ignore that Apple machines are equivalent to any other kind of […]
We all know about the malware Stuxnet and Duqu considered unanimously the first examples of cyber weapon developed by a government to silent attacks critical enemy infrastructures. We have written a lot on the topic, we have followed with attention the excellent analysis made by experts of the sector such as Ralph Langner and the […]
The article is published on the last edition of Pentest Magazine. Enjoy the reading, the magazine is free and to download it you just have to create a free account on www.pentestmag.com. Talking about penetration testing fundamentals and their introduction in private and military sectors. The growing request for experienced IT professionals is demonstration of the awareness […]
The story that I desire to report seems the plot of a movie, Khosrow Zarefarid an Iranian software manager after finding security vulnerability in Iran’s banking system tried to inform the management of the affected banks preparing a detailed report. As usually the bank’s manager ignored the alert so the Iranian expert decided to demonstrate the […]
Last year we have observer an impressive grow of distributed denial-of-service (DDoS) attacks mainly related to operation arranged by group of hacktivists such as Anonymous. During a DDoS attacks multitude of compromised systems attack a single target causing denial of service for users of the targeted system. I desire to analyze with you the interesting results […]
Another Saturday, another round, as announced today the group Anonymous has targeted government sites to protest against British government policy. Nothing new over last week, same goals, same mode of attack, the same result. On internet bounced messages of joy for having staged the second act of the operation called by the group #OpTrialAtHome. Let’s start making some reflections on the real utility of these […]
The US Government is very close to the theme of warfare being among the countries that invest more in the field. In a cyber security context we can enumerate a huge quantity of cyber threats that daily are designed and enhanced, a heterogeneous world and that includes many different options that could harm military and […]