Cloud

Pierluigi Paganini January 09, 2014
LinkedIn – Surge of fake profiles and increment of illicit activities

LinkedIn company filed a complaint in San Francisco against unknown hackers responsible for the creation of an impressive amount of fake profiles. LinkedIn is considered the social network of professionals, its scope is to give the possibility to the users to build their network of business relationship, sharing content of interest and exchanging opinion and […]

Pierluigi Paganini November 26, 2013
Cyberespionage – Chinese Hackers targeting US Cloud service providers

U.S.-China Economic and Security Review Commission reported for the first time that cloud computing “represents a potential espionage threat.” U.S.-China Economic and Security Review Commission reported for the first time that cloud computing “represents a potential espionage threat.” , Chinese hackers are a persistent collector of sensitive information, their action is incessant and represent a […]

Pierluigi Paganini June 10, 2013
DDoS Mitigation – Choosing a Cloud-based solution

An introduction of DDoS mitigation techniques focused on Cloud-based DDoS Mitigation solution, an approach implemented by many companies. Despite their prevalence, DDoS (Distributed Denial of Service) attacks have been erroneously considered minor attacks by some parts of the security community due their “limited” duration. Victims of DDoS attacks are typically forced to interrupt their services […]

Pierluigi Paganini June 02, 2013
iCloud two-factor protection, security flaw or deliberate choice?

iCloud could not properly protect the user’s data despite the implementation of a two-factor protection. Millions of users access to the iCloud to store their data such as photos, music and documents and Apple has tried recently to improve their security introducing in March a two factor authentication system … Do users really know the security mechanisms that […]

Pierluigi Paganini December 06, 2012
Sophos Security Threat Report 2013, today … tomorrow

Sophos was one of the first security firms that has published a report, Sophos Security Threat Report 2013, on current status of security landscape making predictions for incoming year. The document propose an interesting overview on most common and dangerous cyber threats attempting to determine the level of penetration by different countries. The factors that […]

Pierluigi Paganini September 21, 2012
Buying Time with Cloud-based Server Monitoring Solutions

System administrators are extremely busy people, so they will be very pleased to know that cloud-based server monitoring solutions can save them a considerable amount of time. In addition to helping you to reduce your heavy workload and be more productive, cloud-based server monitoring can also have a variety of bottom line benefits for companies. […]

Pierluigi Paganini April 29, 2012
Google used as cyber weapon. New attack method found

True, sometimes the big discoveries are the daughters of the case. That’s what happened to Panos Ipeirotis, a researcher of the New York University, he has discovered a new technique of attack on his Amazon web service using Google Spreadsheets. The methods of attack is a DDoS type and the researcher has named it as Denial of […]

Pierluigi Paganini February 16, 2012
Banking sector under attack, are we ready to the challenge?

Where can I find money? At the bank of course, this is the thought which underlies dell’orietamento of cyber crime that seems to have targeted the banking industry and its services. The event is not new but the intensification of efforts in this area is troubling . The banking sector is considered a strategic sector […]

Pierluigi Paganini December 06, 2011
How much cost malware production? Which are the processes for the production of virus? (Part.2)

Here I am, as promised, to continue the research started together regarding the cost of malware. Reading news of more or less aggressive viruses that cause many damages to public infrastructure to private citizens and sometimes endangering human life itself. But when we are dealing with someone that has different works and that has no […]

Pierluigi Paganini November 28, 2011
Cryptome, social networks and the inconvenient truth

Cryptome, known as Wikileaks’s competitor site  has published  online several reserved documents revealing that the police have access to information of social networks.  The documents describe how the police is able to access to Facebook user information or to the services provided by companies such as AOL and Microsoft. On Cryptome site are also available some guides that explains to cops how to investigate on a person who has used the Yahoo! Messenger. The […]