Last month I attended the Cyber Threat Summit in Dublin and I had the opportunity to assist to the interesting presentation “Humans The weakest link in cyber security” of Mark Johnson, Chairman, The Risk Management Group. The topic of presentation is one of the most interesting in cyber security, the massive introduction of technologies in […]
It’s known that military sector represents a privileged incubator for new technologies than in many cases are subsequently used in civil. The mobile sector represents one of the most vulnerable environments due the lack of awareness on cyber threats and the increasing number of malware that are affecting devices devoid of any defense system. These […]
In these days it has been discussed about a possible Iranian cyber offensive against US banks immediately denied by government of Teheran, the event raised the discussion on the real level of security of banking systems. Financial institutions are considerable privileged targets for a cyber attacks, banking system is a critical asset for a nation […]
Here we are with the regular appointment with Symantec and its report on cybercrime ” The yearly Norton Cybercrime report“, a document that analyzes the evolution of cyber criminal activities and their impact on the society. The report covers different technologies including and social networking and mobile reporting the impact on final customers in economic terms. […]
Article published on Hakin9 IT Security Magazine – August 2012 When we speak about malware we introduce one of the worst cyber threat that daily evolve with the capacity to hit every sector without distinction. The world âmalwareâ is really generic, we refer in fact a heterogeneous family of malicious software designed with the purpose […]
Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins Many people are inclined to leave the responsibility for personal banking security entirely with the banks. However, this is not a good strategy for many reasons, including: You donât want malware of ANY sort on your computing device(s) Even […]
No doubts, one of the most advanced cyber threat to the technological evolution is the malware diffusion, we read daily news regarding new unknown agents developed by cybercriminals, governments or hacktivists, but are we really ready to reduce the exposure of our resources? Some weeks ago a news has passed without too much noise but […]
Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martins, David Pace and Benjamin Gittins Every day the international SWIFT banking network processes financial transactions (relayed between banks) valued at literally trillions of dollars. Today, most of the >1 billion personal computers connected to the Internet are now at least occasionally involved in e-banking, […]
Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace The military strategist Carl von Clausewitz stated: âAll war presupposes human weakness and seeks to exploit it.â Malicious software (malware) is software that is explicitly designed to exploit vulnerabilities in computing devices and human users to the malicious advantage of the malware […]
In the first quarter I proposed the results of an analysis conducted by Prolexic firm on the incidence of DDoS attacks. A DDoS attack represents a nightmare for all those all companies that provide web services that could be blocked by similar offensive, let’s imagine the effect of a DDoS against a financial institution or […]