• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Russia is going to disconnect from the internet as part of a planned test
  • A new batch of 127 million records appears in the dark web
  • Astaroth Trojan relies on legitimate os and antivirus processes to steal data
  • Cryptojacking Coinhive Miners for the first time found on the Microsoft Store
  • Group-IB helped to arrest phone scammers profiting off the backs of the Russian elderly
  • Coffee Meets Bagel dating app confirms data breach
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Cloud…a long journey towards a secure paradigm

When I discussed with many colleagues regarding cloud paradigm most of them smiled declaring that we face yet another found marketing to sell a methodology, known for at least a decade, under new and more appealing clothes. Indeed many of the concepts...

November 26, 2011  By Pierluigi Paganini   Posted In  Laws and regulations  Security 
3

How much cost malware production? Which are the processes for the production of virus? (Part.1)

It is clear that the question awaits an answer deterministic, but an assessment of the main factors that influence the "final expense". My idea is to understand what is the magnitude of the phenomenon and the costs related to a not necessarily familiar...

November 25, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence 
7

ISP can’t be forced to filter transmissions inherent in copyright-infringing content

In recent months it has had discussions about the possibility of blocking sites that somehow support the distribution of pirated software. How to identify these sites? How to find and block communications to the final users. The role of the ISPs is fundamental...

November 25, 2011  By Pierluigi Paganini   Posted In  Laws and regulations 
4

Water utilities hacked … another SCADA system attack

The SCADA systems at the Water utilities in Illinois were hacked by a malicious attacker. “the SCADA system was powered on and off, burning out a water pump.” This is what the hacker has posted  giving proof of a direct compromise of the SCADA...

November 24, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Malware 
11

Cyber Threats, high social impact but … which is the level of awareness?

Last week I had the opportunity to discuss with my father of adverse economic situation and in particular of the Italian public spending. I have introduced some reference to the arms and in particular cyber weapons. What are they? What are the threats...

November 23, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Malware 
6

Massive DNS poisoning: What happened to brazilian ISPs?

What is purpose for DNS cache poisoning attacks? DNS cache poisoning is an  attack methodology used to compromise in the Domain Name System and is made introduceding data artifacts into a DNS name server's cache database that did not originate from...

November 22, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware 
4

Hacking satellites

In a few days we have heard of a couple of satellite attacks by hackers meanwhile surfing on the web I came across more than one occasion in satellite photos reporting strange structures that we asked the real intended use. The successful attacks occurred...

November 21, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence 
16

Elude control … let’s digitally sign malware code

F-Secure Researchers have discovered a digitally signed malware that has code signed with a stolen government certificate belonging to the Malaysian Agricultural Research and Development Institute. The issue has long been known and this attack methodic...

November 20, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Digital ID  Hacking  Malware 
9

The business of Censorship. Golden Shield Project, but not only …

""If you open the window for fresh air,  you have to expect some flies to blow in" this is the Deng Xiaoping’s phrase, which summarizes the essence of the "Golden Shield Project" also Known as the "Great Firewall of China". The project is...

November 19, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Social Networks 
7

Duqu … Do we really know the enemy?

In recent months we have read many reports related the analysis of the famous malware  and different assumptions about its genesis. Who designed the malicious agent? For what purpose? What features of Duqu we know? How can protect our structure...

November 18, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 
8


12345Next ›Last »
Page 1 of 771
  • Digging the Deep Web: Exploring the dark side of the web

    Digging The Deep Web
  • Sponsored Content

    • +Pierluigi Paganini

      • Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) )Threat Landscape Stakeholder Group, member of Cyber G7 Workgroup of the Italian Ministry of Foreign Affairs and International Cooperation, Director of the Master in Cyber Security at the Link Campus University. He is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine",
  • Yoroi blog

    Yoroi Blog

    Yoroi Blog

  • Sponsored Content

  • Sponsored Content

  • Subscribe Security Affairs Newsletter

    Subscribe to Security Affairs Newsletter

    * indicates required




  • Sponsored Content

  • Sponsored Content



Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More