Social Networks

Pierluigi Paganini May 28, 2012
CIA, FBI, NSA, differents agencies for an unique intent…global monitoring

We have discussed several times regarding the intention of the FBI to create a special unit for internet monitoring and surveillance, a task force established to prevent and fight cyber crimes .In reality the Bureau already has different internal units that work with the same purpose and in the last years has promoted different projects […]

Pierluigi Paganini May 08, 2012
FBI,content monitoring,backdoors & Going Dark…shake well before use

Social Networks represent a rich mine of information of great interest for researchers, cybercriminals and government agencies. Analyzing the networks is possible to track detailed profile of any users, his relationships and his habits, the possibility to exercise the control of social networks is an actual form of power, the power of knowledge. We have […]

Pierluigi Paganini May 03, 2012
7 Most Common Facebook Crimes

It’s a pleasure for me to propose to my readers an article of my colleagues of TheBestDegrees Group on social networking and related crimes. Several times I highlighted the importance of social networking and of all related form of communication. Of course with the rapid diffusion of technology the number of crimes is increased dramatically. […]

Pierluigi Paganini March 28, 2012
Japan and the privacy contradictions

The massive use of new technologies has often raised thorny questions about the privacy of network users. The most difficult issue to resolve in the necessary to reach a compromise to assure the users requirements of security and privacy. The debate generates heated arguments, confusion and sometimes decisions in apparent contrast. In Japan, to the multinational […]

Pierluigi Paganini March 23, 2012
Social networks & Deactivated Friend Attack, the cybercrime paradise

A few days ago I wrote about the dangers relating to a not careful attendance of social networks, powerful platforms and privileged communication tools, the subject of increasing interest of cybercrime. Many possibilities for attack across these platforms, from social engineering to cyber espionage, not forgetting the spread of all types of malware. Endless audiences […]

Pierluigi Paganini February 28, 2012
Stratfor on Iran, Palantir and Goldman Sachs

It is impossible to argue otherwise, after one days from the publication of mail stolen during the hack to Stratfor, it’s time to analyze them in the light of political events in recent years. More than a surprise in many cases we have had confirmation on the controversial work made by governments, companies and security […]

Pierluigi Paganini February 04, 2012
Underestimate the threat, a serious error

In recent years it has fully understood the offensive capability of the use of cyber weapons, highly efficient tools to move attacks and espionage operations in total coverage. The effectiveness of the cyber threat is linked not only to its intrinsic characteristics, but also to the choice of channel for its spread and in this […]

Pierluigi Paganini January 30, 2012
Social Media, exercise or not exercise the control

Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and social media, at the center of heated debates. Always consider myself an avid supporter of freedom of expression and free access to the network, but what I want to do in this post is to […]

Pierluigi Paganini January 20, 2012
Which is the main cyber threat? The violated freedom

In these days we have witnessed the escalation of attacks who took the state of Israel as a target. Groups of hackers have coalesced to express their dissent against the policy government. I mention this case because I consider emblematic the answer provided by the Israeli government officials, they have declared infact that attacks like […]

Pierluigi Paganini January 03, 2012
The strategic importance of censorship in search engines

Every day, billions of people making an unimaginable number of searches through search engines. Complex algorithms seek to recover in the shortest possible time and with greater sorrowfulness the requested information. We may venture that a good 80% of Internet users interact with the web through these powerful applications. But the engines are much more, […]