Syria

Pierluigi Paganini August 29, 2013
Syrian Electronic Army hit NYT and Twitter

The group of Syrian Electronic Army hackers is intensification its hacking campaign pro-Assad. Details of the attacks against the HuffingtonPost UK, Twitter and the NYT. The Syrian Electronic Army once again successful in an attack, to be precise the popular group of hacker this time hacked into Twitter, Huffington Post and NY Times’ registry accounts modifying DNS records and […]

Pierluigi Paganini March 13, 2013
Censorship, governments and corporations enemies of internet

The use of technologies to support censorship is deplorable and condemnable but it must be considered that is a sad reality that has sustained the growth of a billionaire market. Many IT companies around the world are specialized in the providing of solutions used by authoritarian regimes to monitor internet use and persecute the opponents. […]

Pierluigi Paganini December 02, 2012
National blackout in Syria and political position of Anonymous

Recently I wrote a post to describe the national blackout occurred is Syria, the event officially justified by the regime as a technical problem but that according many experts it could be the result of Government censorship operation. The collective of Anonymous is sure that Syrian regime was responsible for the national outage which purpose […]

Pierluigi Paganini August 04, 2012
Reuters blogging platform hacked, the critical role of information

In this day my blog has dedicated a great attention to the security of social media, explaining the importance of new communication networks. Today the information is synonymous with power, due this consideration is critical develop the proper processes for its management. To acquire information today we infiltrate social networks, we attack forums and social […]

Pierluigi Paganini July 10, 2012
Syria Files, Wikileaks, Anonymous and dirty affairs

Big outcry on Wikileaks that last week has published more that 2.4 million emails allegedly obtained from continuous hack against Syrian government and organizations connected to the regime. The correspondence of “Syrian political figures, ministries and associated companies” between August 2006 and March 2012 has been defined embarrassing for the government of Damascus and its […]

Pierluigi Paganini June 30, 2012
Dalai Lama + Mac OS X = APT with Tibet malware

Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used in Tibet against Uyghur hacktivists, a Turkic ethnic group living in Eastern and Central Asia. The instance of Tibet malware detected infects OS X machines and is spread following a consolidated schema for politically motivated […]

Pierluigi Paganini June 19, 2012
Deep Web and censorship

  We clarified the use of anonymizing networks is not only related to criminal intents, they represent in fact a powerful instrument to elude censorship introduced by governments in critical areas of the planet. We have provided the examples of Syria and Iran, but the world is full of similar operations that introduce a detailed […]

Pierluigi Paganini June 16, 2012
The malware factory

Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of malicious software designed with the purpose to disrupt computer operation, gather sensitive information, or gain unauthorized access to victims systems. With the term we indicate in fact several types of malicious code such as computer […]

Pierluigi Paganini June 03, 2012
‘Olyimpic Games’ and boomerang effect, it isn’t sport but cyber war

For years, we discuss the authorship of what is considered one of the most offensive cyber weapon of history, Stuxnet, a thousand voices were compared on the difficult question alternating assertions and denials. Always the principal international experts have suggested the U.S. as the authors of the cyber threat, but the main U.S. authorities have […]

Pierluigi Paganini June 02, 2012
How to use Tor Metrics to discover censorship, the Ethiopia case

Tor Metrics Cyber intelligence units are working to develop tools and applications for a deep inspection of the hidden web with the intent of steal classified secret documents of a potential adversary and to maintain the control over cybercrime and terrorists activities and communications. Let’s start from the beginning, which are the available metrics to […]