• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Experts found binary planting and arbitrary file overwrite flaws in NPM
  • Ryuk Ransomware is suspected to be involved in the New Orleans cyberattack
  • From iPhone to NT AUTHORITY\SYSTEM - exploit 'Printconfig' dll with a real-world example
  • Iran announced to have foiled a second cyber-attack in a week
  • Largest hospital system in New Jersey was hit by ransomware attack
  • Security Affairs newsletter Round 244
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Iran, the cyber threat … are we creating a new enemy ?

"Iran, the super power capable of threatening the world". This is the title of a hypothetical sensationalist article aimed to enhance the computer skills of a nation of which little is known. In recent weeks the strange coincidence of events is helping...

December 24, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Malware  Security 

What should we expect from next cyber weapon? Hypothesis on Stuxnet 3

This 2011 was the year of the consecration of cyber weapons from a mediatic point of view. Awareness of the threat has been shared by all the major states of the world. This weapons could be been used in cyber attacks, claiming victims from cyberspace...

December 23, 2011  By Pierluigi Paganini   Posted In  Hacking  Malware  Security 

Russia, cyber repression in the social networks era

Several times in these posts we have discussed of the importance of social media in recent years. Social Media are the valuable carrier to disclose political decisions taken by central governments. This is well known to the main strategist of governments...

December 22, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Security  Social Networks 

Malware attacks Georgia Hospital, have we learnt the lesson?

The medical industry is historically one of the sectors that has benefited more than others for the introduction of technology. Devices allow ever more complex operations every day to millions of patients and to medical equipments, from health conditions...

December 21, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware  Security 

The thin line between monitoring and censorship

During the last year we have seen the consolidation of the tendency to use social media as a major vector for the exchange of information. The imperative is to be social, no matter if you need to share photos with friends or to express an opinion on a topic...

December 20, 2011  By Pierluigi Paganini   Posted In  Intelligence  Laws and regulations  Security  Social Networks 

Duqu – The worst may still have to come for critical infrastructures

Duqu, a name that we are reading since several months and with whom we have called a malware that scares the scientific community for some features we will shortly describe. I wrote a lot in this blog about Duqu and on more than one occasion we have raised...

December 19, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Hacktivism  Intelligence  Malware  Security 

SCADA and vulnerabilities to critical infrastructures

Over the last few months there have been different events that led to the story than they can be dangerous attacks on SCADA systems used to control production processes in industrial plants of various kinds, from industrial production to the provision...

December 18, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Malware  Security 

Software piracy,from statistics to hypotheses of cyber warfare

With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether software piracy is deliberate or not, it is still illegal and punishable by law. We distinguish several type of software...

December 17, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware  Security 

The year of the networked protest, from SOPA act to Anonymous

It's end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what else will we remember of this 2011? No doubts, we will remember the new way to use Internet, an irreplaceable vector for social protests,...

December 15, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Digital ID  Hacking  Intelligence  Security  Social Networks 

2011, CAs are under attack. Why steal a certificate?

2011 was a terrible year for the certification authorities, the number of successful attacks against some major companies reported is really high and totally out of any prediction. Many attacks have had disturbing consequences.It all began, or so we were...

December 15, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Digital ID  Hacking  Intelligence  Security 


12345Next ›Last »
Page 1 of 910
  • Digging the Deep Web: Exploring the dark side of the web

    Digging The Deep Web
  • Sponsored Content

  • Yoroi blog

    Yoroi Blog

    Yoroi Blog

  • Sponsored Content

  • Sponsored Content

  • Sponsored Content

  • Sponsored Content



Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled