Hackers

Pierluigi Paganini January 14, 2012
Sykipot attacks U.S PKI infrastructures based on smart cards

In these hours on the web is turning the news of a cyber attack performed by a group of Chinese hackers against some U.S. Government Agencies. Once again, the weapon used against the strategic objectives is a cyber weapon, in particular it has been used a new version of the trojan Sykipot. Chinese hackers have […]

Pierluigi Paganini January 11, 2012
Banking sector, bad news regarding cyber threats

The new year does not bode well in terms of cyber threats banking universe. The need for new services, primarily the ability to make transactions in mobile scenario, exposing the banks and their platforms to serious threats. Particularly in these early days of 2012, two reports have raised some concern: Global warning about Banking trojan […]

Pierluigi Paganini January 10, 2012
North Korea, why too many see it as a cyber threat?

In the recent years we have seen increasing attention from governments in the presidium of the cyber space. The concept of cyber warfare has become reality with the materialization of new threats that can strike unpredictably with a real destructive power like conventional weapons. In a period of radical changes are narrow new alliances and […]

Pierluigi Paganini January 09, 2012
Rim, Nokia and Apple. Monitoring, interferences and violated privacy

What I want to discuss today is the interference of governments in what should be the private business and what are the consequences of an attitude so invasive. The news of this hour is that Nokia, RIM and Apple have provided to the Indian government, particularly its militia, a backdoor that provides the ability to control […]

Pierluigi Paganini January 08, 2012
“Cyber China” From Operation Aurora to China Cyber attacks Syndrome

Cyber China is considered the most active persistent collector of Western intelligence and intellectual property, is it a syndrome or China represents a real threat? When we think of China in relation to cyber warfare, we imagine an army of hackers hired by the government in a computer room ready to successfully attack any potential target. China […]

Pierluigi Paganini January 07, 2012
Symantec hack, some further considerations

No doubt, the news of the beginning of the year is the alleged theft of the source of the Symantec antivirus. The news is sensational, “They stole everything to the police station!”, hilarious but very serious. Let’s try to resume the events. A group that calling itself the Lords of Dharmaraja has posted online a […]

Pierluigi Paganini January 06, 2012
The nightmare backdoor , reflections on the case Huawei

Just at this time I came across an interesting discussion proposed by a colleague on the possible presence of a backdoor in the devices of Huawei company. The news in itself is terrifying, even if it is discussed for years. The presence of a backdoor once again raises the issue of qualification of the hardware, […]

Pierluigi Paganini January 05, 2012
2012, the threat of malware. Evolution in the mobile scenario

Wanting to try out hypotheses about the future of the spread of malware, we cannot help but examine the mobile scenarios. For those who develop viruses and similar mobile platforms are a favorite target. The main causes are: The ubiquity of mobile phones such as smartphones of the latest generation. The technology evolution and the […]

Pierluigi Paganini January 04, 2012
Why the use of a cyber weapon has proved a winner?

In recent months one of the topics of greatest interest in the international scientific community has been the development of new cyber weapons to use against hostile countries. What dominates, without any doubt, was the use of viruses and other malware to attack critical infrastructure of the opponents. The Stuxnet case did school, for sure […]

Pierluigi Paganini January 03, 2012
The strategic importance of censorship in search engines

Every day, billions of people making an unimaginable number of searches through search engines. Complex algorithms seek to recover in the shortest possible time and with greater sorrowfulness the requested information. We may venture that a good 80% of Internet users interact with the web through these powerful applications. But the engines are much more, […]