Blog Posts Tagged with "Pierluigi Paganini"
DNSChanger: FBI’s Internet Blackout Postponed
March 06, 2012 Added by:Plagiarist Paganini
For several months, news was circulating about the planned blackout of the Internet for potentially millions of users on March 8. Last week a federal judge postponed that order for 120 days to give businesses and governments more time to mitigate the DNSChanger threat...
Comments (0)
NASA Unprepared for Cyber Attacks
March 05, 2012 Added by:Plagiarist Paganini
The internal investigation at NASA also revealed that almost none of the agency's portable devices are encrypted, and that at least one of the stolen laptops contained algorithms to command and control systems for the International Space Station...
Comments (0)
The Cyber Arms Race: Casting Shadows on the Future
March 01, 2012 Added by:Plagiarist Paganini
We are confronted with a new arms race for cyber weapons, and as governments around the world compete for innovation, a cultural revolution is occurring in nations which have been considered minor, and which are now nearly on par superpowers like the U.S. and China...
Comments (0)
Antivirus Ban for Iran: A Controversial Penalty
February 20, 2012 Added by:Plagiarist Paganini
Iran will be banned from the purchase of antivirus systems, a technological embargo with clear implications for the Stuxnet virus attacks and the need to prevent further infections to control systems for critical infrastructures, namely their nuclear programs...
Comments (0)
Anonymous Now Interested in the Great Firewall of China
February 17, 2012 Added by:Plagiarist Paganini
Why have they not targeted China before? Hypothetically, the structure of Anonymous could have been infiltrated and directed against the Chinese as part of a strategy defined by the West, or perhaps someone is using the name Anonymous to conduct undercover operations...
Comments (0)
Nortel: From Bankruptcy to Industrial Espionage Victim
February 15, 2012 Added by:Plagiarist Paganini
The damage is incalculable if we consider the enormous amount of data that may have been lost. Information on technological solutions, business reports, and other sensitive documents were stolen for years, seriously compromising the intellectual property of the company...
Comments (3)
Subordinate Digital Certificates Pits Trustwave vs Mozilla
February 14, 2012 Added by:Plagiarist Paganini
Trustwave declared that the issuing of subordinate root certificates to private companies was done to allow inspection of the SSL encrypted traffic that passes through their networks. Trustwave decided to stop issuing these in the future, and revoked the existing ones...
Comments (0)
KPN Hack: Why was Customer Notification Delayed?
February 13, 2012 Added by:Plagiarist Paganini
The login credentials were stored in plain text in the repository that had been exposed, and that is absurd. This is a failure of the basic security procedures that should be recognized internationally, and is an offense for which there should be heavy penalties...
Comments (0)
DDoS Attacks: An Excuse to Talk About IPv6 Security
February 10, 2012 Added by:Plagiarist Paganini
The switchover from the existing address protocol IPv4 to IPv6 will give attackers a great opportunity. With the introduction of the protocol a huge quantity of new internet addresses is available, and those addresses could be used as sources for DDoS attacks...
Comments (0)
Syrian Drama and the Impact on Cyberspace
February 07, 2012 Added by:Plagiarist Paganini
Cyberspace is comparable to a stormy sea in which you navigate by sight, and where the scenarios are changing rapidly in an unpredictable way by the presence of uncontrolled entities such as cyber hacktivists, in addition to cyber armies set up by the main world powers...
Comments (0)
Hacking Satellite Communications
February 06, 2012 Added by:Plagiarist Paganini
We must consider that compromised satellites are a serious risk, that the exposure could affect communications in the business and military sectors, and could also cause the loss of sensitive and strategic technological information...
Comments (5)
VeriSign Hacked - But Why?
February 03, 2012 Added by:Plagiarist Paganini
The impairment of these mechanisms could lead to the redirection of traffic to bogus sites with serious consequences - and not just that - the compromise of the Digital Certificate model itself raises the risk for the interception of emails and confidential documents...
Comments (0)
Acts of Terrorism vs. Cyber Threats: New Offense Scenarios
February 02, 2012 Added by:Plagiarist Paganini
“I do not think today it is necessarily the number one threat, but it will be tomorrow... Counterterrorism... with the FBI is the present number one priority. But down the road, the cyberthreat, which cuts across all programs, will be the number one threat to the country...”
Comments (0)
New Drive-By Malware Spam Infects Upon Opening Email
February 01, 2012 Added by:Plagiarist Paganini
According the announcement from researchers at Eleven, a German security firm, it is sufficient that a communication is merely opened in the email client to infect the target without the user clicking on a link or opening an attachment...
Comments (0)
Stuxnet: Are We Safe Now? Of Course Not...
January 31, 2012 Added by:Plagiarist Paganini
We are fighting with an invisible enemy. We are under attack, and we have no idea of the potentiality of agents that theatrically could remain in stealth mode inside the target, avoiding security systems for several years, gathering information and preparing the final attack...
Comments (0)
Evidence of Chinese Attacks on US Defense Contractors
January 30, 2012 Added by:Plagiarist Paganini
At least six Chinese IP addresses were used to proxy or host the command and control servers. The Netbox webserver is mainly used by those who speak Chinese. In fact, all the documentation to setup and learn the framework is only available in Mandarin...
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization