• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • FireEye: 650 new threat groups were tracked in 2020
  • FBI silently removed web shells planted on Microsoft Exchange servers in the US
  • Sweden blames Russia for Swedish Sports Confederation hack
  • Microsoft fixes 2 critical Exchange Server flaws reported by the NSA
  • Adobe addresses two critical vulnerabilities in Photoshop
  • Experts released PoC exploit code for a critical RCE in QNAP NAS devices
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Cybercrime, an industry that knows no crisis

  During this days I had the opportunity to read the results of a couple of surveys: The PricewaterhouseCoopers (PwC). Its Global Economic Crime Survey has demonstrated that Cybercrime has double digit growth being today third biggest crime...

December 3, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Digital ID  Hacking  Intelligence  Malware  Security 

Social Network Poisoning … they want to spy on us, we evade

Social Network Poisoning term refers the effect produced by the application of methods designed to make unreliable the knowledge related to a profile and its relationships. "Be Social" is the imperative of the last years. We live alternative lives, we...

December 2, 2011  By Pierluigi Paganini   Posted In  Digital ID  Hacking  Intelligence  Security  Social Networks 

Assange, Spy Files and uncomfortable truths

If we talk about security which could be our worst nightmare? My answer is "to be vulnerable in every moment of our day, whatever we are doing and wherever we are" How could this happen? Imagine that someone has installed an app on our phones, and he is able...

December 2, 2011  By Pierluigi Paganini   Posted In  Digital ID  Hacking  Intelligence  Laws and regulations  Security  Social Networks 

“Mobile” intrigue … A prying eyes to carry around …

Let we use these ingredients to start some serious reflection on safety issues related to mobile devices: Robust growth in the mobile market, accompanied by technological advances that have made ​​these devices real PC. No awareness of those...

December 1, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Digital ID  Hacking  Intelligence  Laws and regulations  Malware  Security 

From printers to ovens … next step hack our brains.

Are we able to ensure that every peripherals connected to our computers and present in our offices is proof of attack? The first answer will be ... “sure”.  We observe same problem with our household appliance that are being more intelligent. The...

November 29, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware  Security 

Cryptome, social networks and the inconvenient truth

Cryptome, known as Wikileaks’s competitor site  has published  online several reserved documents revealing that the police have access to information of social networks.  The documents describe how the police is able to access to Facebook user...

November 28, 2011  By Pierluigi Paganini   Posted In  Digital ID  Hacking  Intelligence  Laws and regulations  Security  Social Networks 

E-Corruption … “who controls the controller?”

The control of information is the main concern of Governments. More or less declared the major players of a precarious global economy have implemented digital surveillance systems, from India to China, passing Russia and USA. The crucial...

November 27, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Laws and regulations  Security 

Cloud…a long journey towards a secure paradigm

When I discussed with many colleagues regarding cloud paradigm most of them smiled declaring that we face yet another found marketing to sell a methodology, known for at least a decade, under new and more appealing clothes. Indeed many of the concepts...

November 26, 2011  By Pierluigi Paganini   Posted In  Laws and regulations  Security 

How much cost malware production? Which are the processes for the production of virus? (Part.1)

It is clear that the question awaits an answer deterministic, but an assessment of the main factors that influence the "final expense". My idea is to understand what is the magnitude of the phenomenon and the costs related to a not necessarily familiar...

November 25, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence 

ISP can’t be forced to filter transmissions inherent in copyright-infringing content

In recent months it has had discussions about the possibility of blocking sites that somehow support the distribution of pirated software. How to identify these sites? How to find and block communications to the final users. The role of the ISPs is fundamental...

November 25, 2011  By Pierluigi Paganini   Posted In  Laws and regulations 


12345Next ›Last »
Page 1 of 1127
  • Digging the Deep Web: Exploring the dark side of the web

    Digging The Deep Web
  • Sponsored Content

  • Sponsored Content

  • PixFuture

  • PixFuture

  • Security Affairs Awarded as Best European Tech blog at European Cybersecurity Blogger Awards

    securityaffairs
  • Center for Cyber Security and International Relations Studies

  • Subscribe Security Affairs Newsletter

    newsletter

Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT