Cyber espionage is considerable as  one of the most aggressive and dangerous cyber threats, its silent operation could steal sensitive information, company secrets and intellectual properties for a long time. Recently many cyber espionage campaigns have been discovered, last in order of time is the Winnti campaign but we cannot forted also Red October and […]
The number of cyber attacks is increased in an impressive way, cyber criminals, hacktivists, independent and state-sponsored hackers are daily operating in cyberspace conducting more or less dangerous offensive. Everyone is exposed to concrete risks of cyber attacks, internet users, private business and government offices, thatâs why is fundamental to have a clear idea on […]
One of the most interesting company in security landscape is ReVuln, its researchers specialize in the security assessment and are the authors or various interesting studies on large scale applications and SCADA systems, few weeks ago I presented their work on vulnerability assessment on Gaming platforms. This time I desire to present another excellent analysis […]
Many times we discussed about large diffusion of mobile devices and of related cyber threats, around a months ago I presented the case of HTC mobile that revealed 18 million devices commercialized by Taiwanese company had security flaws that could exposes users to serious risks, in particular the bugs could allow the theft of information […]
Rapid7 security firm has published an interesting whitepaper entitled âSecurity Flaws in Universal Plug and Playâ in which reports the result of a research conducted in the second half of 2012 that evaluated the global exposure of UPnP-enabled network devices. Security world has become accustomed to so surprising data, over 80 million unique IPs were identified […]
Today I desire to discuss about a very interesting study by Solutionary’s Security Engineering Research Team (SERT) that shared the results related an analysis on malware and exploit kits diffusion observed with its solution ActiveGuard service platform. The platform has collected and analyzed malicious events that hit company clients globally, the data have been provided […]
Today on Atlantic Council web site it has been published an excerpts from remarks by Secretary of Defense Leon Panetta at King’s College in London that remarks the inadequacy of NATO networks to reject cyber threats, according the officials the situation appears really critic in both private and public sectors, and it is very concerning also […]
Stuxnet first and news of countless zero-day vulnerabilities in the wild have strengthened the idea that citizens security is constantly menaced by group of hackers that for different purposes are able to inflict serious damages to the structures that surround us. Critical infrastructures represent privileged targets for very different actors such as cyber terrorists or […]
Aaron Swartz has committed suicide on January 11, 2013 in New York City. I have long been fought if you write something about this extraordinary boy, but not dedicate a tribute would be a shame. Aaron Swartz has decided to leave a huge void in the IT scenario. For me, as the entire world he […]
According last report published by The European Network and Information Security Agency (ENISA)  âENISA Threat Landscape â Responding to the Evolving Threat Environmentâ that summarizes principal cyber threats, critical infrastructures represent privileged targets for emerging trends. Different agents such as terrorists, state-sponsored hackers or hacktivists could be interested in attack control systems within a critical […]