monitoring

Pierluigi Paganini July 23, 2012
Malware… It’s all about you…

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace The military strategist Carl von Clausewitz stated: “All war presupposes human weakness and seeks to exploit it.” Malicious software (malware) is software that is explicitly designed to exploit vulnerabilities in computing devices and human users to the malicious advantage of the malware […]

Pierluigi Paganini July 22, 2012
Power Pwn & Darpa projects for development of hacking tool

We have discussed several time of the interference of governments inside our ordinary life, they try to control our network, to spy on our social network profiles, to access silently to our gaming console and every thing surround us. The nightmare experienced by the protagonist of the movie “Enemy of the State” is now a […]

Pierluigi Paganini July 15, 2012
Cyber security at large sporting events

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, David Pace The London 2012 Olympics will bring together 10,500 athletes, diplomats, politicians, business leaders and millions of spectators from all over the world. Behind the scenes there is an immense effort being made to ensure the security and well-being of everyone participating, in any […]

Pierluigi Paganini June 19, 2012
Deep Web and censorship

  We clarified the use of anonymizing networks is not only related to criminal intents, they represent in fact a powerful instrument to elude censorship introduced by governments in critical areas of the planet. We have provided the examples of Syria and Iran, but the world is full of similar operations that introduce a detailed […]

Pierluigi Paganini June 14, 2012
The right to anonymity on Internet and legal implications

The demand of anonymity services is increased in response to the increase network monitoring and censorship,but the anonymity is a concept that induces fear. Everyday, all our web actions leave traces of ourselves and of our way of life through the storing of massive amounts of personal data in databases in the internet, all these information […]

Pierluigi Paganini June 13, 2012
Cyber security during sporting events

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 05 2012.  The article offers an overview on cyber security issues relating to sports events, competitions that are a priority target for terrorists and cyber criminals. What weight has the information security component on the overall organization? An analysis of the main types of computer attacks and possible consequences in a highly critical contest such as a sporting event. Introduction Whenever we see a major sporting event we […]

Pierluigi Paganini June 09, 2012
Google Online Security against state-sponsored attacks

According to a post of Eric Grosse, VP of security engineering at Google, on Google Online Security blog the company is constantly monitoring the web for malicious activity on its systems, with particular attention to attacks made by third parties to illegally access into users’ accounts. Google declared that is ready to adopt measurements to mitigate […]

Pierluigi Paganini June 04, 2012
The hacktivism phenomenon

Article published on The Malta Indipendent The last years have been characterised by the escalation of operations conducted by hacktivist groups, such as the famous Anonymous, which have expressed social dissent through cyber attacks. In contemporary society technology plays a crucial role, and is used as a new cultural vehicle and even aggregation element. It’s a […]

Pierluigi Paganini May 28, 2012
CIA, FBI, NSA, differents agencies for an unique intent…global monitoring

We have discussed several times regarding the intention of the FBI to create a special unit for internet monitoring and surveillance, a task force established to prevent and fight cyber crimes .In reality the Bureau already has different internal units that work with the same purpose and in the last years has promoted different projects […]

Pierluigi Paganini May 08, 2012
FBI,content monitoring,backdoors & Going Dark…shake well before use

Social Networks represent a rich mine of information of great interest for researchers, cybercriminals and government agencies. Analyzing the networks is possible to track detailed profile of any users, his relationships and his habits, the possibility to exercise the control of social networks is an actual form of power, the power of knowledge. We have […]