Large scale infiltration

Pierluigi Paganini October 08, 2012
Why do we need hackers today?

In the last decade the role of hacker is deeply changed, these strange characters were once kept away from government affairs, but the scenario is reversed, there has been an unprecedented technological evolution and principal countries have discovered a new way of making war, a new way of spying. Today the hacker is the most […]

Pierluigi Paganini August 03, 2012
Facebook, more than 83 million questionable profiles.The poisoned networks

Crazy … a year ago on a warm June evening I began to formalize some ideas on a concept of great relevance today, the “social network poisoning”. I am the person who coined the term, proposing the scientific community with some colleagues who share my ideas as Andrea Zapparoli Manzoni and Kalos Bonasia. Immediately I inserted […]

Pierluigi Paganini July 31, 2012
Rakshasa, is it possible design the perfect hardware backdoor?

Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by cyber criminals and in cyber attacks during state sponsored operations in cyber warfare scenarios. This malicious software presents a wide range of purposes and functionalities, they are used to steal information or to destroy control […]

Pierluigi Paganini July 29, 2012
Smart Phone Monitoring and Malware… Up close and personal…

Article published on The Malta Indipendent by Ron Kelson – Vice Chair ICT Gozo Malta Project, Pierluigi Paganini – Director and CISO of Bit4ID, Italy and Benjamin Gittins – CTO Synaptic Laboratories Ltd. Mobile phones were once the status symbols of high-flying business executives. Today, mobile phones have become an essential part of our day-to-day lives. […]

Pierluigi Paganini July 05, 2012
Who really takes advantage of the operations of Anonymous?

I desire to tribute another article to the group that catch the  worldwide attention of security community, Anonymous. Few years to consolidate its image become one of the most debated phenomenon on internet, many consider the collective a threat, many other the expression of a dissent to listen. Both interpretations are correct, but let’s think […]

Pierluigi Paganini June 13, 2012
Hacktivist vs Twitter, security of OAuth authorization

There isn’t peace for social network platforms, priority target for cybercrime and governments, they represent a mine of data useful for business and espionage. After the news of the LinkedIN hack, also Twitter have been successfully attacked by a group of hacktivist named LulzSec Reborn that has leaked user credentials of more of 10,000 accounts. […]

Pierluigi Paganini May 30, 2012
Flame malware, from genesis to the plot theory

In this article I desire to discuss about many personal doubts and beliefs regarding the Flame malware, first my idea that we are facing with a new powerful cyber weapon. In the same hours  the Iranian Computer Emergency Response Team Coordination CenterLab,   CrySyS Lab and Kaspersky Lab have published news regarding the new malware that […]

Pierluigi Paganini May 29, 2012
China-made US military chip, security backdoor or debugging functionality?

During last days an insistent news circulated on the internet, a microchip used by the US military and manufactured in China contains a secret “backdoor” that make possible a remote control of the devices. The disclosure is attributed to Cambridge University’s Computing Laboratory, it’s clear the media impact of similar news in security environments, an […]

Pierluigi Paganini May 22, 2012
LinkedIN – Vulnerability in the authentication process and related risks

A serious vulnerability has been found in the authentication process of the popular network LinkedIN, the news published on the Spanish blog of the security expert Fernando A. Lagos Berardi. The article published reports that a vulnerability in LinkedIn allows obtaining user’s password. For the authentication process LinkedIn adopts a token in login phase that can […]

Pierluigi Paganini May 21, 2012
US vc China. Is cyber warfare gap increasing?

The Chinese offensive capabilities in cyberspace in this period are, more than ever, subject of great interest from the international community that fears the rise of China‘s technological colossus. In recent days a summit had placed in front of U.S. and China with the aim of promoting mutual cooperation to restore equilibrium in cyberspace. Many […]