Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our first article we talked about the intentional or unintentional disclosure of personal information in social networks that can expose you to logical (computer-based) threats and we gave you some recommendations about how to properly manage this risk of […]
Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins The explosion of social networks and new user accounts in recent years is staggering. There are now over 1,000 social networking sites on the Internet, with Facebook currently being the largest, with over 840 million user profiles. To put this […]
Article published on Hakin9 IT Security Magazine – August 2012 When we speak about malware we introduce one of the worst cyber threat that daily evolve with the capacity to hit every sector without distinction. The world âmalwareâ is really generic, we refer in fact a heterogeneous family of malicious software designed with the purpose […]
Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins âBe socialâ is the buzzword of recent years. No matter whether we are at home, in the gym, at work, or elsewhere, we are haunted by the need to be part of something online. We live alternative online lives, and we have dense networks of […]
Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martins, David Pace and Benjamin Gittins Every day the international SWIFT banking network processes financial transactions (relayed between banks) valued at literally trillions of dollars. Today, most of the >1 billion personal computers connected to the Internet are now at least occasionally involved in e-banking, […]
Crazy … a year ago on a warm June evening I began to formalize some ideas on a concept of great relevance today, the âsocial network poisoningâ. I am the person who coined the term, proposing the scientific community with some colleagues who share my ideas as Andrea Zapparoli Manzoni and Kalos Bonasia. Immediately I inserted […]
Many experts are sure, the new horizons of intelligence are in the social media and in the ability to control them. Governments are more careful on the analysis of social media and the vast amount of information which they hold. Intelligence agencies have learned that Social networks and forums are exceptional instruments for information gathering […]
This time target of attacks of the Anonymous group is the Australian government, at least 10 websites were taken down to protest proposed changes to privacy laws. The government want to force national ISP to spy on users make available their information to law enforcement and security agencies. The Anonymous Australia collective in a mail […]
In today’s society technology plays a crucial role and is used as a new cultural vehicle, and even aggregation element or carrier to express dissent against the policies of governments and private companies. Groups such as Anonymous are maximum expression of a phenomenon defined “Hacktivism” that refers the usage of computers and computer networks […]
Money motivates the cyber assault to banking by cybercrime, but the finance world is also considered a privileged target for sponsored-state attacks as part of cyber offense strategies. Let’s consider that the banking world is profoundly changing, the introduction of mobile devices, social networks, the openess to web services, the coming of new technologies such […]