Blog Posts Tagged with "Pierluigi Paganini"

03b2ceb73723f8b53cd533e4fba898ee

DNSChanger: FBI’s Internet Blackout Postponed

March 06, 2012 Added by:Pierluigi Paganini

For several months, news was circulating about the planned blackout of the Internet for potentially millions of users on March 8. Last week a federal judge postponed that order for 120 days to give businesses and governments more time to mitigate the DNSChanger threat...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

NASA Unprepared for Cyber Attacks

March 05, 2012 Added by:Pierluigi Paganini

The internal investigation at NASA also revealed that almost none of the agency's portable devices are encrypted, and that at least one of the stolen laptops contained algorithms to command and control systems for the International Space Station...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Cyber Arms Race: Casting Shadows on the Future

March 01, 2012 Added by:Pierluigi Paganini

We are confronted with a new arms race for cyber weapons, and as governments around the world compete for innovation, a cultural revolution is occurring in nations which have been considered minor, and which are now nearly on par superpowers like the U.S. and China...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Antivirus Ban for Iran: A Controversial Penalty

February 20, 2012 Added by:Pierluigi Paganini

Iran will be banned from the purchase of antivirus systems, a technological embargo with clear implications for the Stuxnet virus attacks and the need to prevent further infections to control systems for critical infrastructures, namely their nuclear programs...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Anonymous Now Interested in the Great Firewall of China

February 17, 2012 Added by:Pierluigi Paganini

Why have they not targeted China before? Hypothetically, the structure of Anonymous could have been infiltrated and directed against the Chinese as part of a strategy defined by the West, or perhaps someone is using the name Anonymous to conduct undercover operations...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Nortel: From Bankruptcy to Industrial Espionage Victim

February 15, 2012 Added by:Pierluigi Paganini

The damage is incalculable if we consider the enormous amount of data that may have been lost. Information on technological solutions, business reports, and other sensitive documents were stolen for years, seriously compromising the intellectual property of the company...

Comments  (3)

03b2ceb73723f8b53cd533e4fba898ee

Subordinate Digital Certificates Pits Trustwave vs Mozilla

February 14, 2012 Added by:Pierluigi Paganini

Trustwave declared that the issuing of subordinate root certificates to private companies was done to allow inspection of the SSL encrypted traffic that passes through their networks. Trustwave decided to stop issuing these in the future, and revoked the existing ones...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

KPN Hack: Why was Customer Notification Delayed?

February 13, 2012 Added by:Pierluigi Paganini

The login credentials were stored in plain text in the repository that had been exposed, and that is absurd. This is a failure of the basic security procedures that should be recognized internationally, and is an offense for which there should be heavy penalties...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

DDoS Attacks: An Excuse to Talk About IPv6 Security

February 10, 2012 Added by:Pierluigi Paganini

The switchover from the existing address protocol IPv4 to IPv6 will give attackers a great opportunity. With the introduction of the protocol a huge quantity of new internet addresses is available, and those addresses could be used as sources for DDoS attacks...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Syrian Drama and the Impact on Cyberspace

February 07, 2012 Added by:Pierluigi Paganini

Cyberspace is comparable to a stormy sea in which you navigate by sight, and where the scenarios are changing rapidly in an unpredictable way by the presence of uncontrolled entities such as cyber hacktivists, in addition to cyber armies set up by the main world powers...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Hacking Satellite Communications

February 06, 2012 Added by:Pierluigi Paganini

We must consider that compromised satellites are a serious risk, that the exposure could affect communications in the business and military sectors, and could also cause the loss of sensitive and strategic technological information...

Comments  (5)

03b2ceb73723f8b53cd533e4fba898ee

VeriSign Hacked - But Why?

February 03, 2012 Added by:Pierluigi Paganini

The impairment of these mechanisms could lead to the redirection of traffic to bogus sites with serious consequences - and not just that - the compromise of the Digital Certificate model itself raises the risk for the interception of emails and confidential documents...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Acts of Terrorism vs. Cyber Threats: New Offense Scenarios

February 02, 2012 Added by:Pierluigi Paganini

“I do not think today it is necessarily the number one threat, but it will be tomorrow... Counterterrorism... with the FBI is the present number one priority. But down the road, the cyberthreat, which cuts across all programs, will be the number one threat to the country...”

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

New Drive-By Malware Spam Infects Upon Opening Email

February 01, 2012 Added by:Pierluigi Paganini

According the announcement from researchers at Eleven, a German security firm, it is sufficient that a communication is merely opened in the email client to infect the target without the user clicking on a link or opening an attachment...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Stuxnet: Are We Safe Now? Of Course Not...

January 31, 2012 Added by:Pierluigi Paganini

We are fighting with an invisible enemy. We are under attack, and we have no idea of the potentiality of agents that theatrically could remain in stealth mode inside the target, avoiding security systems for several years, gathering information and preparing the final attack...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Evidence of Chinese Attacks on US Defense Contractors

January 30, 2012 Added by:Pierluigi Paganini

At least six Chinese IP addresses were used to proxy or host the command and control servers. The Netbox webserver is mainly used by those who speak Chinese. In fact, all the documentation to setup and learn the framework is only available in Mandarin...

Comments  (0)

Page « < 1 - 2 > »