malware

Pierluigi Paganini May 02, 2012
Flashback Trojan, a business opportunity for all

Many people who do not work in our sector are asking me two questions with increasing frequency: Can a virus infect a MAC pc? Is it possible to monetize a malware development? How is it possible? Obvious my answers, we cannot think of a software system free of bugs and vulnerabilities. To those who I have […]

Pierluigi Paganini May 01, 2012
Identity Theft, the growing crime

Every day we exchange personal information with colleagues, friends and unknown people with no idea how they are treated and for what use they will be managed. Telephone number, email address or driver’s license number are example of the data we provide ordinary using new media channels like internet and the social networks. The use […]

Pierluigi Paganini April 26, 2012
DNSChanger , much ado about nothing and the wrong choice

 Summary of previous episodes In beginning of the year a news circulated on internet regarding the planned blackout of Internet for millions of users on March 8th decided by FBI to deal with DNSChanger Trojan. The action must be done to stop the diffusion of the malware that has infected millions of computers all over […]

Pierluigi Paganini April 24, 2012
Iran,Oil Industry under cyber attack,are we close to a military strike?

A new cyber attack against Iran, in particular this time the Oil Industry was the target of a Malware Attack. The news was widespread by Officials in the Iranian oil ministry, they say that their network and the country’s main oil export terminal were infected with a malware; due this event the government has taken […]

Pierluigi Paganini April 23, 2012
Analysis of cybercrime and its impact on private and military sectors

The article is published on the last edition of PenTest AUDITING & STANDARDS 03 2012.  Several reports published in the last months demonstrate that Cybercrime has double digit growth, being today among the four biggest crime threat all over the world, within asset theft crimes, frauds and corruption. The trend is the same all over the word, […]

Pierluigi Paganini April 22, 2012
Flashback? Are you joking? There aren’t malware for Mac

Yesterday I discussed with a friend and colleague Francesco on the lack of awareness of Apple’s users on malware that plague products of the house in Cupertino. This consideration is one of the reasons of the success in malware development for Apple, the users totally ignore that Apple machines are equivalent to any other kind of […]

Pierluigi Paganini April 20, 2012
Cyber threats in mobile environment

Today I desire to share with you the results of a study of Trend Micro security firm focused on mobile threat incidents related to the first quarter of 2012. The large diffusion of mobile devices and the leak of awareness on the principal cyber threats have produced an increasing interest of the cybercrimein mobility sector, […]

Pierluigi Paganini April 13, 2012
Botnets and cyber warfare, a dangerous combination

The US Government is very close to the theme of warfare being among the countries that invest more in the field. In a cyber security context we can enumerate a huge quantity of cyber threats that daily are designed and enhanced, a heterogeneous world and that includes many different options that could harm military and […]

Pierluigi Paganini April 12, 2012
OSINT research to discovery lucrative business of monitoring systems

The dramatic events of recent months have occurred in Syria should lead us all in deep thought. What value do we place on human life? Are we really willing to sacrifice the life of a child for money? International opinion has been found before the massacres of innocent civilians by the Assad regime, but little […]

Pierluigi Paganini April 09, 2012
China, cyber warfare and challenges for the future

When discuss on cyber warfare we cannot regardless of the role played by nations such as China, U.S. and Russia. In particular, the Beijing government has distinguished itself in recent years for two key aspects: the aggressive strategy cyber conduct towards foreign countries the country’s willingness to become independent from the technological The second aspect is […]