Espionage

Pierluigi Paganini December 31, 2011
The power of social networks

For years now we live with the confirmation of the importance of social networks and their impact on daily life. As with any other subject there are many and conflicting opinions on what is considered a social revolution. Millions, billions of people who daily exchange thoughts, opinions, images, emotions, anything that makes us feel alive […]

Pierluigi Paganini December 29, 2011
GSM mobile … the insecure network

The latest discovered vulnerability in GSM ( Global System for Mobile) technology is worrying many telecom operators of several countries due to their impact on an audience of billions users. Some experts in the Security Research Labs in Berlin have shown how to get the remote control of mobile phones to send SMS and make calls. […]

Pierluigi Paganini December 28, 2011
Iran threat … are we close to the conflict?

These days, there are countless news regarding the Iranian government and its ability to pursue its objectives of a cyber strategy. Winds of war, many swear that the next conflict could involve the much disputed nation. That something has changed in recent weeks is palpable, the Tehran government has used more than one occasion events […]

Pierluigi Paganini December 26, 2011
Stratfor hack, “not so private and secret anymore”?

This Christmas will be reminded also for the hack of the Stratfor Global Intelligence service made by collective Anonymous who disclosed company website and also a the full client list of over 4000 individuals and corporations. They gained access to a subscriber list stored on stratfor.com, and that list contained unencrypted credit card data. The full […]

Pierluigi Paganini December 25, 2011
Israeli spy gear sent to Iran via Denmark, the dirty trade

Today I will discuss with you about the news that I was very impressed regarding the sale of a internet traffic monitoring system sold by an Israeli company to the Iranian government. The sold system is the “NetEnforcer” and was sold through the intermediary of a Danish company RanTek A / S. NetEnforcer bandwidth management devices provide […]

Pierluigi Paganini December 22, 2011
Russia, cyber repression in the social networks era

Several times in these posts we have discussed of the importance of social media in recent years. Social Media are the valuable carrier to disclose political decisions taken by central governments. This is well known to the main strategist of governments such as Russia, the country where a massive cyber repressive action was carried out […]

Pierluigi Paganini December 20, 2011
The thin line between monitoring and censorship

During the last year we have seen the consolidation of the tendency to use social media as a major vector for the exchange of information. The imperative is to be social, no matter if you need to share photos with friends or to express an opinion on a topic of social interest. Over the past […]

Pierluigi Paganini December 17, 2011
Software piracy,from statistics to hypotheses of cyber warfare

With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether software piracy is deliberate or not, it is still illegal and punishable by law. We distinguish several type of software privacy: End user: sing one licensed copy to install a program on multiple computers,copying distrubuting […]

Pierluigi Paganini December 15, 2011
The year of the networked protest, from SOPA act to Anonymous

It’s end of the year and time for reflections. Yesterday we have discussed on incident occurred to CAs, but what else will we remember of this 2011? No doubts, we will remember the new way to use Internet, an irreplaceable vector for social protests, expression of social malaise and of too much stolen liberty. We […]

Pierluigi Paganini December 15, 2011
2011, CAs are under attack. Why steal a certificate?

2011 was a terrible year for the certification authorities, the number of successful attacks against some major companies reported is really high and totally out of any prediction. Many attacks have had disturbing consequences.It all began, or so we were led to believe, with the case Comodo. Comodo officials revealed that the registration authority had […]