Cyber warfare

Pierluigi Paganini October 24, 2013
Android Wroba banking trojan targeted Korean users

The Antivirus vendor Malwarebytes revealed that the Wroba banking trojan distributed via file sharing sites and alternative markets targeted Korean users. Today I presented at Cyber Threat Summit 2013 the topic “Modern online-banking cybercrime” and just a few hours after it is appeared the new Android banking Trojan targeting Korean banks. The number of malware […]

Pierluigi Paganini October 05, 2013
Reading IBM X-Force 2013 Mid-Year Trend and Risk Report

IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a detailed analysis of current security landscape, including data on main cyber threats and information on mitigation techniques. IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a study that identifies Social media as the main target of cyber criminal activities. The powerful social networking […]

Pierluigi Paganini October 03, 2013
FireEye World War C report – Nation-state driven cyber attacks

FireEye security firm released World War C report to explain nation-state motives behind advanced Nation-state driven cyber attacks. Nation-state driven cyber attacks are routinely conducted on a global scale to defend national sovereignty and project national power. We are living in the cyber era, human conflict is involving also the fifth domain of warfare, the cyberspace. As never […]

Pierluigi Paganini September 29, 2013
Iran hacked US Navy Computers

US officials revealed that Iran hacked unclassified Navy computers in recent weeks in an escalation of cyber attacks against US infrastructures. The Wall Street Journal reported that Iran hacked unclassified US Navy computers, the allegations were made by US officials that consider the attacks of most serious intrusion within Government Network made by foreign states. “The U.S. officials said the attacks were carried out by […]

Pierluigi Paganini September 25, 2013
Chinese hackers increasingly attracted to the drone technology

Intelligence agencies reveal that Chinese hackers increasingly attracted to the drone technology while Chinese drone industry grows like never before! The fact that Chinese hackers are most persistent collectors for sensitive information is not a mystery, more difficult to demonstrate the direct involvement of the PLA behind the operations of computer experts that systematically seek to unravel […]

Pierluigi Paganini September 15, 2013
CBMEN, DARPA’s peer-to-peer technology for battlefield

DARPA is conducting a program codenamed CBMEN (Content-Based Mobile Edge Networking) for sharing of reconnaissance and Intelligence data on battlefield through P2P technology DARPA is conducting a program codenamed CBMEM (Content-Based Mobile Edge Networking) for sharing of reconnaissance data over local wireless and radio networks of military troops without having to be tethered to a server. The […]

Pierluigi Paganini August 29, 2013
Syrian Electronic Army hit NYT and Twitter

The group of Syrian Electronic Army hackers is intensification its hacking campaign pro-Assad. Details of the attacks against the HuffingtonPost UK, Twitter and the NYT. The Syrian Electronic Army once again successful in an attack, to be precise the popular group of hacker this time hacked into Twitter, Huffington Post and NY Times’ registry accounts modifying DNS records and […]

Pierluigi Paganini August 27, 2013
Information Warfare, Russia, New Zeland…it is arms race

Information warfare, under this term governments are working to improve their cyber capabilities, last in order of time are Russia and the New Zeland. Information warfare, cyber warfare, are all terms that are becoming familiar for population all over the world. Every government is aware of the risks connected to the exposure to a cyber […]

Pierluigi Paganini August 14, 2013
The cyber capabilities of Iran can hit US

A study titled “Iran:How a Third Tier Cyber Power Can Still Threaten the United States” states that Iran has sufficient cyber capabilities to attack the US Iran has sufficient cyber capabilities to attack the US causing serious damages to the critical infrastructures of the country. The news doesn’t surprise the cybersecurity experts that know very […]

Pierluigi Paganini July 30, 2013
Credit Card Redirection, the evolution of phishing

Researchers at Securi discover Credit Card Redirection attack technique to hijack credit card data during transactions on e-commerce sites. With the term credit card redirection is indicated the illegal practice to steal credit and debit card information compromising legitimate web services. Security experts are observing an increase of credit card redirection cases, cyber criminals are varying their […]