What is purpose for DNS cache poisoning attacks? DNS cache poisoning is an attack methodology used to compromise in the Domain Name System and is made introduceding data artifacts into a DNS name server’s cache database that did not originate from authoritative sources. Consider that the domain name server translates a domain name into an specific […]
In a few days we have heard of a couple of satellite attacks by hackers meanwhile surfing on the web I came across more than one occasion in satellite photos reporting strange structures that we asked the real intended use. The successful attacks occurred in 2007 and 2008. The more serious of the two happened […]
F-Secure Researchers have discovered a digitally signed malware that has code signed with a stolen government certificate belonging to the Malaysian Agricultural Research and Development Institute. The issue has long been known and this attack methodic has triggered a widespread lack of confidence in the process of trusting based on the use of certificates. The impairment […]
““If you open the window for fresh air, you have to expect some flies to blow in” this is the Deng Xiaoping’s phrase, which summarizes the essence of the “Golden Shield Project” also Known as the “Great Firewall of China”. The project is related to the development of the most efficient system of censorship and surveillance in the world of the People’sRepublic of China. The project was started in 1998 and officially began in 2003 driven by the government to operate the control of […]
In recent months we have read many reports related the analysis of the famous malware and different assumptions about its genesis. Who designed the malicious agent? For what purpose? What features of Duqu we know? How can protect our structure from this threat? Let’s approach the questions step by step talking about its origin, on which much has been discussed. Comparing Stuxnet to Duqu Many researcher indicate that Stuxnet is the progenitor of the Duqu, both […]
English version Which could be a critical objective to choose if we evaluate media coverage of the event, complexity and effort necessary to the success of the attack, the audience involved, access to resources used in turn for further offenses? Personally, I have many doubts … a gaming platform! Yesterday on a national newspaper has been published […]
Once upon a time the espionage made by agents who essentially lived in complete anonymity and free of the past were able to recover the greatest amount of information about their objectives by building dangerous relationships with the reality of interest. Over the years, and the overwhelming technological evolution, scenarios are profoundly changed. Access to information most often passes through the circuits of a mobile device or a personal computer and this led to an increasing focus of many companies and government agencies in […]
The title is borrowed from a presentation made by Francis Brown of Stach & Liu, Hacker Halted 2011 in Miami. The presentation focus on two topics that are crucial in the modern scenario: Cloud Computing Search engines demonstrating the fact that the overall safety of complex systems can be impacted by incorrect implementation of the “cloud” paradigm. Through the knowledge of authentication mechanisms is relatively easy to retrieve access codes, passwords and secret keys necessary for access to data stored within a cloud as happened for Amazon’s EC3. Let me remind you the […]
Few days ago I have partecipated to an open discussion started by Stefano Mele, a security and cyber-terrorism expert, on the development of Internet Content Monitor System by the Soviet government. In April, the “Russian Federal Service for Supervision Telecoms” has announced it that it has launched a tender for developing a Content Monitor System with a budget of $ 530,000. Following the tender the development phase was started in august and have […]
Bitdefender reseachers have discovered a number of brute force attacks against several web site. The attacks have been done using a server at the Massachusetts Institute of Technology (MIT). The hacking attack against the MIT.edu infrastructure started with a malicious script on one MIT server. One MIT server (CSH-2.MIT.EDU) hosts a malicious script actively used […]