Hackers

Pierluigi Paganini February 14, 2012
Nortel, from industrial espionage to bankruptcy

By now the news of successful attacks perpetrated against private companies are no more surprising except sometimes for inefficiency of the implemented security policies . The Wall Street Journal has reported the news that the telecoms company Nortel Networks has been repeatedly exploited by Chinese hackers for a long time, almost a decade. The former Nortel […]

Pierluigi Paganini February 13, 2012
Iran case … security threat and oil business

At this time we are seeing continuing propaganda operations of Iranian government that is trying to convince with its proclamations the public opinion regarding technical capacities in its possession. Military troops, nuclear weapons, and a cyber army ready to destroy any enemy stronghold in cyber space. Too much experts believe that in reality, the West rather […]

Pierluigi Paganini February 11, 2012
KPN hacked, who and when warned users?

The nightmare of every Internet Service Provider has materialized in The Netherlands where KPN company, one of the main ISPs, has stopped to provide any email services after that a group of hackers has published the credentials of more than 500 customers on the internet. Once again to be discussed is the incident management and […]

Pierluigi Paganini February 10, 2012
Illustrious victim, Cia.gov Tango Down by Anonymous

Just this morning I wrote in my article the ability of the Anonymous group that stands out in my assessment for the effectiveness of its operations. I tried to analyze the phenomenon, and I noticed that many colleagues tend to approach hacktivists ideology as a student movement, disorganized, and that can only be due to […]

Pierluigi Paganini February 10, 2012
Anonymous, it could become a cyber weapon

The group of hacktivist known as Anonymous is considered as the uncontrollable variable in the cyber space capable of surprising us with striking operations worthy of the most skilled cyber army. Precisely this is the point, are we sure that the group’s operations are so difficult to control or predict? Are we able to mitigate the risks of exposure? […]

Pierluigi Paganini February 10, 2012
Cloud Computing forensic psychological considerations on security

Cloud computing will play an increasingly critical role in the future of the information technology sector, impacting individual consumers, corporations, governments, and international commerce alike. As a forensic psychologist with a national security and law enforcement background, arguably, the design and implementation of cloud computing also involves exposure to multiple security risks at various levels. Understanding the “dark side” of cloud computing at […]

Pierluigi Paganini February 09, 2012
DDoS, IPv6 is an excuse to talk about

The day has come, Network service providers are reporting the first IPV6 distributed denial-of-service (DDoS) attacks and the event is extremly significat from a secutity point of view. The news has been reported in the Arbor Networks’ 7th Annual Worldwide Infrastructure Security Report. Despite this king of attacks remain relatively rare, the news must alert […]

Pierluigi Paganini February 08, 2012
Symantec data leak, too many doubts on the assumption of extortion

The story is familiar to all, the Source Code, the Source code of property of Symantec company has been stolen and it has been object of negotiation between the group of hacker responsible of the crime and law enforcement agents who have acted to protect the company. Conclusion of the negotiation is that the precious […]

Pierluigi Paganini February 07, 2012
Syria drama and impact on cyberspace

The situation in Syria aroused much concern in the world because it could trigger, in a highly unstable, a conflict that many have tended to avoid. The world, today unarmed, is witnessing a fierce crackdown led by President Bashar al-Assad, a massacre against an opposition that wants the removal of what is considered a dictator […]

Pierluigi Paganini February 06, 2012
Hacking satellite communications and possible implication

Once more to worry about is the real security of satellite infrastructures. In a technological civilization satellites play a vital role in the management and transmission of information of all kinds, satellites infact do the work in silent thet we enjoy every day, but often forget this crucial aspect. Are these powerful systems of communication […]