Cyber Crime

Pierluigi Paganini March 16, 2012
CIA and the intelligence components of the things

Unfortunately, we rarely stop to reflect on the reality that surrounds us and the potential of the devices we use every day in the office, at home and when we’re out. The technology behind each of them has became the main architect of their operation and no matter whether we are talking about our phone or […]

Pierluigi Paganini March 15, 2012
Anonymous vs Vatican, thirst for justice or criminal act?

Everyone in Italy have read of the attacks made by Anonymous against the Vatican, but very few professionals have expressed a clear position on the incident. Everyone in Italy knows the risks and effects associated with exposure to radio waves emitted by the antennas of radio Vatican, but no one is really the opposite. Children and people […]

Pierluigi Paganini March 14, 2012
Surgical malware attack agains US via Iran

Sometimes warfare operation and cyber crime are really difficult to distinguish, especially when the cyber scenario is related to country that is facing with rising political tension such as Iran. I refuse to call cyber criminals, a group of expert hackers who made himself the protagonist of a complex story from different points of view. The […]

Pierluigi Paganini March 11, 2012
Spying on Facebook and not only, it’s emergency

A few days ago I wrote an article on cyber espionage and its higher incidence in the computer crimes. What are the figures who most frequently perform operations of this type? An interest in cyber espionage has been demonstrated by government agencies in search of sensitive information and information relating to industrial technologies used by […]

Pierluigi Paganini March 09, 2012
Anonymous, DNS Amplification Attacks for Operation Global Blackout

In this first couple of months of 2012 we have assisted to an escalation of cyber attacks made by  groups of hacktivist, first Anonymous, that have hit main institutions and agencies all over the world. The modus operandi of the group is now well known, attacks that have crippled many victims were mainly of DDoS type, in this way […]

Pierluigi Paganini March 08, 2012
Cyberespionage and new opportunities for cybercrime

The continued technology push that is shaping our society during the last decade has brought an exponential increase in computer crimes,  every technology innovation has in fact represented an opportunity for industry of crimeto make profitable frauds and business. The cyber crime has many facets, cybercrime fact manifests itself in countless forms and contextualized in relation […]

Pierluigi Paganini March 06, 2012
DNSChanger, FBI’s internet blackout postponed from 8 March to 9 July

Many people are asking me for updates on the case DNSChanger which held its breath many network users. During the last months the news circulating on internet on the planned blackout of Internet for million of users on 8 March decided by FBI to deal with cyber threats. The action must be done to stop […]

Pierluigi Paganini March 02, 2012
Thin line between advertising and violated privacy

We live in an information age in which contemporary society is like a sponge that produces and consumes extraordinary amounts of information, at this time the new power is the detention of the most data on whatever is around us. The technological processes of the last decade have influenced, as never before, the experience of […]

Pierluigi Paganini February 29, 2012
Young cyber army, cyber threat or resource to enhance?

We live in economically tumultuous days and even more in the cyberspace. Not a day goes by that you do not observe a striking hack, yet another multinational ridiculed and made bare and vulnerable to human eyes. It’s happened with Sony, with RSA with Stratfor, clay giants collapsed at the hands of groups of hactivists, a […]

Pierluigi Paganini February 23, 2012
GPS Spoofing, old threat and new problems

For several years are known vulnerabilities of GPS systems, but the wide use of these technology in today’s society need a continuous reassessment of the risks we are exposed. The first report in which they were discussed threats to technology is known as the “Volpe Report” that describe which are the main reasons to consider […]