We never tire of repeating, social networks are an ideal conduit, due their large diffusion, for the spread of malware, they are used by cybercrime to realize complex fraud schema and by military to conduct offensive operations or cyber espionage campaigns. ESET Security Research has published an interesting analysis on the âPokerAgentâ botnet detected during 2012 […]
Despite simplicity of the schema phishing attacks have increased exponentially in the last years targeting every sector,both public and private. RSAâs October Online Fraud Report 2012Â revealed a worrying scenario, phishing attacks increased up 19% over the second half of 2011, the total loss for various organizations has been estimated to $2.1 billion over the last […]
Law enforcement and intelligence agencies conscious of the high risks related to cyber threats have started massive monitoring campaign, everything must be controlled to avoid unpleasant surprises. The trend is shared by every governments of the planet, intelligence agencies are making great investments in term of money and resources to define new methods and to […]
Social networks are platforms that have monopolized majority of userâs internet experience, the imperative is to âsocialâ, and everybody share an incredible amount of personal information exposing its digital identity to serious risks. An element of attraction for cyber criminals is the huge number of services, from gaming to payments, that are developing on these […]
Zeus, a name that security experts know very well, it’s one of the most prolific and dangerous malware of the history. In the years several versions have been detected, it’s one of the first malware for which it has been applied an excellent business model that made possible its evolution in cybercrime, unique constant is the […]
I consider the Government surveillance one of the most interesting security topic, the possibility legally and not to interfere with digital experience of its citizens. In many cases governments for various reasons, such as homeland security, spy on users tracking their operations on internet, intercept their communications and access to mail accounts. The phenomenon is […]
Last year I wrote about a new powerful surveillance system that Russian government committed to private business to implement a complex monitoring system, officially to prevent terrorist attacks against Russia. The day is come, today the system has been deployed officially to prevent on-line pedophilia but it obvious that a similar system is also able […]
The numerous attacks and data breaches occurred during the last 12 months demonstrated that despite high attentions in security the principal causes of the incidents are leak of authentication processes, absence of input validation on principal applications and of course the human factor is among the main accused. Last year different data breaches exposed millions […]
The future is now, I’ve often spoken about the enormous potentiality of gaming platforms and of the capabilities of young players, months ago I introduced a US project to develop an application to spy on gaming console all over the world gathering precious information on their owners. The control of a gaming console could be […]
After much work during the last months I’m proud and happpy to announce the publishing of The Deep Dark Web book. It is AVAILABLE @Amazon website  http://www.amazon.com/The-Deep-Dark-Web-hidden/dp/1480177598 PAPER BOOK It is AVAILABLE @Amazon website  http://www.amazon.com/dp/B009VN40DU KINDLE It is AVAILABLE @SmashWords website  http://www.smashwords.com/books/view/247146 It is AVAILABLE @Barnes & Noble website    http://www.barnesandnoble.com/w/the-deep-dark-web-pierluigi-paganini/1113594408?ean=2940015852837 and we have uploaded it also to Amazon […]