Cyber Crime

Pierluigi Paganini November 18, 2011
Duqu … Do we really know the enemy?

In recent months we have read many reports related the analysis of the famous malware  and different assumptions about its genesis. Who designed the malicious agent? For what purpose? What features of Duqu we know? How can protect our structure from this threat? Let’s approach the questions step by step talking about its origin, on which much has been discussed. Comparing Stuxnet to Duqu Many researcher indicate that Stuxnet is the progenitor of the Duqu, both […]

Pierluigi Paganini November 14, 2011
Video game & Security, a new opportunity? Gaming platform primary target for cyber attacks. (EN/IT)

English version Which could be a critical objective to choose if we evaluate media coverage of the event, complexity and effort necessary to the success of the attack, the audience involved, access to resources used in turn for further offenses? Personally, I have many doubts …  a gaming platform!  Yesterday on a national newspaper has been published […]

Pierluigi Paganini November 13, 2011
Trojan & Co, the new frontiers of espionage

Once upon a time the espionage made by agents who essentially lived in complete anonymity and free of the past were able to recover the greatest amount of information about their objectives by building dangerous relationships with the reality of interest. Over the years, and the overwhelming technological evolution,  scenarios are profoundly changed. Access to information most often passes through the circuits of a mobile device or a personal computer and this led to an increasing focus of many companies and government agencies in […]

Pierluigi Paganini November 13, 2011
Public Tender for an Internet Content Monitoring System, really strange.

Few days ago I have partecipated to an open discussion started by Stefano Mele, a security  and cyber-terrorism expert, on the development of Internet Content Monitor System by the Soviet government. In April, the “Russian Federal Service for Supervision Telecoms” has announced it that it has launched a tender for developing a Content Monitor System with a budget of $ 530,000.  Following the tender the development phase was started in august and have […]

Pierluigi Paganini November 09, 2011
On demand Calling service for cybercriminals growing

Trusteer Researchers have found a professional calling service that has been designed for cybercriminals needs. The service is organized to offer the extraction of sensitive information needed for bank fraud and identity theft from individuals. The security company Trusteer has discovered an advertisement for making targeted call calls in different languages to private individuals, banks, […]

Pierluigi Paganini November 07, 2011
Can Cloud Computing Manage Serious Cyber Threats?

Can Cloud Computing Manage Serious Cyber Threats? U.S. Cyber Chief Says yes, personally I have several doubts regarding this opportunity. I draw inspiration in the article that I read and I quote to introduce the topic, dwelling on the words of Alexander that appeared, in my humble opinion, empty of a technical foundation. In fact, the paradigm can be adopted to implement complex architectures that can be used to combat threats posed by cyber crime. Do not forget, […]

Pierluigi Paganini November 05, 2011
CIA Admits It Monitors, Analyzes Facebook, Twitter

As always support social networks are now the ideal carrier for an abnormal amount of information and this is the main reason why many governments have invested and are investing in sophisticated analysis tools that can implement intelligent search within an ocean seemingly unrelated data. An unit part of the CIA’s Open Source Center is responsible for monitoring the vast and various social networks, local and international news, radio, and television, Internet chat rooms, and pretty much anything from […]

Pierluigi Paganini November 03, 2011
Hackers Attacked U.S. Satellites Connected To The Internet, Report Finds

Hackers interfered with the operation of two U.S. government satellites in 2007 and 2008 obtaining access through a ground station in Norway. The usage of the attacked satellites is climate monitoring. There aren’t any news regarding the nature of the interference but notes that the hackers “achieved all steps required to command” the Terra AM-1 […]