Data-breaches

Pierluigi Paganini July 01, 2013
Two-factor Authentication for SMBs

The purpose of this article is to cover the challenges SMBs are facing when it comes to using authentication methods to protect their online websites and applications, and comparing a number of two factor authentication services for SMBs.   The report includes: –          Why ‘password only’ protection is not enough anymore –          The challenges of […]

Pierluigi Paganini February 15, 2013
From CISPA to Obama’s executive order on national cybersecurity

During the last days worldwide internet community expressed great concern on the possibility of a reintroduction of The Cyber Intelligence Sharing and Protection act (CISPA)  before the US House by House Intelligence Committee Chairman Mike Rogers (R-Mich.) and ranking member Rep. Dutch Ruppersberger (D-Md.). The controversial cyber bill raised an heated debate, supporters believe it […]

Pierluigi Paganini January 09, 2013
My reading of the “ENISA Threat Landscape” report

The European Network and Information Security Agency (ENISA) is the EU’s agency responsible for cyber security issues of the European Union, its last report “ENISA Threat Landscape – Responding to the Evolving Threat Environment”, summarizing the principal threats and providing also useful indication on the emerging trends. The report proposes the list of top threats […]

Pierluigi Paganini December 23, 2012
Have you been hacked? … you must disclose it!

During 2009 it was revealed that one of the primary defense contractor BAE Systems was hacked causing the exposure of sensible information on F-35 fighter jet. The reserved information were obtained by a group of hackers who accessed to internal server of the contractor, but BAE Systems admitted it only in 2012. The attackers were […]

Pierluigi Paganini November 08, 2012
Joining hands against cybercrime in Africa

Concerned over rising threats online, Cyber security agents in Africa are taking a proactive step by collaborating with global network-security experts, to curb cybercriminal activities in the continent where they will share information and technical know how. Cyber security agents in Africa will gain an even better view of emerging cyber threats by working with […]

Pierluigi Paganini October 28, 2012
Is it really so simple crack your password?

The numerous attacks and data breaches occurred during the last 12 months demonstrated that despite high attentions in security the principal causes of the incidents are leak of authentication processes, absence of input validation on principal applications and of course the human factor is among the main accused. Last year different data breaches exposed millions […]

Pierluigi Paganini September 25, 2012
Expected new wave of cyber attacks against banking

In these days it has been discussed about a possible Iranian cyber offensive against US banks immediately denied by government of Teheran, the event raised the discussion on the real level of security of banking systems. Financial institutions are considerable privileged targets for a cyber attacks, banking system is a critical asset for a nation […]

Pierluigi Paganini September 10, 2012
Part 1: Authentication Series – A world of passwords

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our previous articles we discussed malware, phishing, viruses and other computer infections designed to maliciously acquire your personal information. Last week we talked about low privacy settings on social networks, today we will talk about weak passwords. Most people […]

Pierluigi Paganini May 20, 2012
Insider perspectives on global cyber safety and security status (Part 3 of 4)

Article published on The Malta Indipendent Data-breaches, intellectual property loss and your money… We have all heard the headlines about the social and economic implications of cybercrime, but how bad is the situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do […]