• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Over 30k Internet-Exposed QNAP NAS hosts impacted by CVE-2022-27596 flaw
  • Pro-Russia Killnet group hit Dutch and European hospitals
  • New Prilex PoS Malware evolves to target NFC-enabled credit cards
  • New LockBit Green ransomware variant borrows code from Conti ransomware
  • Nevada Ransomware Has Released Upgraded Locker
  • TrickGate, a packer used by malware to evade detection since 2016
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Drones vulnerable to hijacking, concerns on security and privacy

Last week a saw a satellite image taken by Google Earth related to a mysterious vehicle, apparently an unmanned aerial vehicle (UAV), parked at Lockheed Martin’s Skunk Works facility in Palmdale, California. “Skunk Works” LM’s Advanced Development...

July 2, 2012  By Pierluigi Paganini   Posted In  Intelligence  Security 

Are your business operations secure?

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, David Pace, Ben Gittins Today, the chief executive officers (CEOs) of many businesses are becoming aware of the need to ensure their IT systems are secured to protect...

July 1, 2012  By Pierluigi Paganini   Posted In  Hacking  Security 

Dalai Lama + Mac OS X = APT with Tibet malware

Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used in Tibet against Uyghur hacktivists, a Turkic ethnic group living in Eastern and Central Asia. The instance of Tibet malware...

June 30, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware  Security 

Stratfor refunds clients.Concerns on subcontractors in the security chain

Last Christmas the Stratfor Global Intelligence was hacked by Anonymous who disclosed company website and also the full client list of over 4000 individuals and corporations. The hacker gained access to a subscriber list stored on stratfor.com, and that...

June 29, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Laws and regulations  Security 

RSA SecurIDs Cracked In 13 Minutes,rumors and denials

The news has creating great surprise in the security community, a group of computer scientist has declared that has cracked the RSA SecurID encryption model. The news is sensational due the large diffusion of the tokens for the implementation of PKI infrastructures...

June 28, 2012  By Pierluigi Paganini   Posted In  Hacking  Security 

#opJapan, Anonymous against Japan and its war to piracy

A couple of days ago a read about a new amendment to copyright laws passed in Japan last week. The amendment recognizes as illegal downloads of pirated material establishing extremely severe penalties for the violators. The law comes into effect in October...

June 27, 2012  By Pierluigi Paganini   Posted In  Hacking  Laws and regulations  Security 

Capfire4, malware-as-a-service platform for crime

It’s not first time we discuss of cybercrime and in particular of its organizational models, creative servicex offer any kind of support to organizations and individuals that desire to conduct an attack against specific target. Cyber criminals in the past...

June 26, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

The ‘cyber war’ era began long ago

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace  US military strategist John Boyd states: “War comprises acts of physical, biological, psychological, social, cultural and other destruction...

June 25, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Security 

Cyber war, the strategic importance of the defense

I was reading an interesting article on the cyber wars I was attracted by the comparison of Stuxnet to the first nuclear bomb detonated at a site nicknamed Trinity in the barren Jornada del Muerto desert of New Mexico on  July 16, 1945. Although the comparison...

June 24, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Security 

The mystery of a massive cyber attack on Iran

Winds of cyber war blow Iran, the political situation is becoming difficult to manage, exacerbating the tones of a psychological battle growing. After the publishing of the news regarding the genesis of Stuxnet and Flame every actor of the conflict...

June 23, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware  Security 


12345Next ›Last »
Page 1 of 1405
  • Digging the Deep Web: Exploring the dark side of the web

    Digging The Deep Web
  • Center for Cyber Security and International Relations Studies

  • Subscribe Security Affairs Newsletter

    newsletter
  • Security Affairs Awarded as Best European Tech blog at European Cybersecurity Blogger Awards

    EU Sec Bloggers Awards 22

Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version