Article published on The Malta Indipendent on October 7th 2012 Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins Bank (in)Security: Between the 1880s and the 1930s, physical bank burglaries were a substantial problem. To counter these threats bank’s employed vaults to protect their contents from theft, unauthorised use, fire, natural disasters, and other […]
What could happen if a malware compromises a communication system adopted daily by 663 million users (info dated September 2011)? Security experts have spread an alert to Skype users about an ongoing attack that try to induce them to load a link that spreads malware. The famous voice-over-Internet application is totally changed from its original […]
In the last weeks we have assisted to a massive DDoS attacks against U.S. financial institutions that demonstrated how much invasive is this type of offensive. The dimension of the attacks was very impressive considering that it has beaten the defense systems of so large organizations, experts believe it is negligible if compared to the […]
In the last decade the number of cyber incidents related to technologies that surround us is growth exponentially, the principal concerns are related to all those objects with an “intelligent component” that we daily use and that we expose on internet for different purposes. This category includes also the Medical devices, elements with increasing complexity […]
It’s known that military sector represents a privileged incubator for new technologies than in many cases are subsequently used in civil. The mobile sector represents one of the most vulnerable environments due the lack of awareness on cyber threats and the increasing number of malware that are affecting devices devoid of any defense system. These […]
It’s happened again, cyber criminals have stolen digital certificates related to companies recognized reliable to sign malicious code. This time the victim is Adobe and according its security chief, Brad Arkin, a group of hackers have signed malware using Adobe digital certificate obtained compromising a vulnerable build server that was used to get code validation […]
Since last month a new campaign of cyber attacks have hit the Energy sector, all is started with the incidents to Saudi Aramco and RasGas companies, in both cases a malware infected internal networks without impacting on the production systems. Due the nature of the targets, the mode of attack and the specific malware behavior […]
Article published on Hakin9 IT Security Magazine “Raspberry Pi Hacking – Exploiting Software” 08/12 The article proposes an analysis of the main cyber threats that worry security experts and that are profoundly changing the cyber space. The exponential growth of the number of cyber threats and attacks is rebutted by a wide range of statistical […]
Reports from main security firms confirm the increasing growth of cyber attacks based on malware, in particular the large diffusion of Apple products has made them desirable targets. The explosion of malicious agents designed for Apple OS X operating system as surprised Apple users that have found themselves suddenly vulnerable exactly such as users of […]
The defense of cyberspace is becoming one the most concerning question to approach, governments all around the world are massively investing in cyber technology with the resultants that the number of cyber operations is increasing exponentially. William J. Lynn, U.S. Deputy Secretary of Defense, states that: “as a doctrinal matter, the Pentagon has formally recognized cyberspace as a […]