877.791.9571 |

About the Author:

Pierluigi Paganini is Chief Information Security Officer at Bit4Id, firm leader in identity management, member of the ENISA (European Union Agency for Network and Information Security)Treat Landscape Stakeholder Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at Cyber Defense magazine, Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to create the blog "Security Affairs," recently named a Top National Security Resource for US. Pierluigi is a member of the The Hacker News team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News magazine and for many other security magazines. He is the author of the books The Deep Dark Web and Digital Virtual Currency and Bitcoin.

Internet of Things: How Much are We Exposed to Cyber Threats?

The Internet of Things (IoT) is one of the paradigms that will influence our society most of all in the next few years, and it is already conditioning the […]


Sony Pictures Hack: Is North Korea Innocent or Guilty?

Sony Pictures corporate network hacked
At the end of November, the corporate network of Sony Pictures was breached and taken offline by a malware-based attack. The attack caused the disclosure […]


Hacking the Tor Network: Follow Up

In a previous post, I presented the main techniques used to hack Tor networks and de-anonymize Tor users. Law enforcement and intelligence agencies consider “de-anonymization” of Tor users a […]


2015 Security Predictions: The Rise of Hacking Campaigns

With just a few days until the end of 2014, it’s time to analyze what’s happened in the last twelve months. I would like to analyze with you the […]


User Behavior Modeling with Mobile Device Sensors

The rapid diffusion of mobile technology and the convergence of numerous services that use the paradigms, including social networking, cloud computing and payment, are urging IT and security industries […]


Cyber Attack on Sony Pictures is Much More than a Data Breach – UPDATED

Sony Pictures corporate network compromised by a major cyber attack
At the end of November, computer systems at the corporate network of Sony Pictures were breached and taken offline by […]


Regin: State-Sponsored Malware or Cybercrime?

Regin, a highly advanced spying tool
A few weeks ago, Symantec security firm published the results of its investigation on the backdoor Regin, a highly advanced spying tool used in […]


Foreign Hackers Constantly Target US Critical Infrastructure

US critical infrastructure under attack
US authorities are warning companies operating in every industry of a significant increase in the number of cyber attacks that target US critical infrastructures every […]


WireLurker, Masque: Every Apple iOS App Could Be Compromised

Wrong conviction and bad habits
Before the introduction of the Masque vulnerability and related attacks, I desire to contextualize my analysis. The security community is assisting with the rapid rise […]


StingRay Technology: How Government Tracks Cellular Devices

StingRay Technology
StingRay is an IMSI-catcher (International Mobile Subscriber Identity) designed and commercialized by the Harris Corporation. The cellular-surveillance system costs as much as $400,000 in the basic configuration, and […]


What’s Your Advice for Moving Workloads to the Cloud?

The rapid diffusion for the cloud computing paradigm and promised benefits for the adoption of cloud infrastructure are attracting a growing number of businesses and organizations.

Of course, it is […]


Hacking ATMs: The New Wave of Malware

In recent weeks, security experts at Kaspersky Lab have observed several attacks on Automated Teller Machines (ATMs) which were infected by malware dubbed Tyupkin. Tyupkin is one of the […]


Evolution of 3D Printing Technology Raises Security Concerns

Also known as the term additive manufacturing (AM), 3D printing is a process for making a three-dimensional object of almost any shape starting from a 3D model or other […]


Pricing Policies in the Cyber Criminal Underground

Underground markets are places on the Internet where criminal gangs offer a wide range of illegal products and services. Black markets are crowded places where single individuals or criminal […]


Exploiting and Verifying Shellshock: CVE-2014-6271

Everything you need to know about the Bash Bug vulnerability
The Bash Bug vulnerability (CVE-2014-6271)
A new critical vulnerability, remotely exploitable, dubbed “Bash Bug”, is threatening billions of machines all over […]


Risks and Cyber Threats to the Healthcare Industry

Every day, our digital identity is menaced by several cyber threats that are becoming even more sophisticated. Every year, data breaches expose million of records that are used by […]


Alleged Hack of iCloud Exposed Nude Photos of Celebrities Online

The case
The gossip news of this week is the alleged hack of Apple’s iCloud of many celebrities. Hundreds of naked photos purportedly belonging to more than one hundred actors […]


Hacking traffic light systems

Traffic light systems security issues
We often see movie scenes in which hackers are able to hack systems for the control of traffic lights, with catastrophic consequences, unfortunately we must […]


MonsterMind, HACIENDA: How Intelligence is Threatening “Our” Cyberspace

Five Eyes and more
In the last twelve months, whistleblower Edward Snowden has revealed to the public how invasive is the cyber strategy of the US government and its cyber […]


Operation Emmental: Banking Hit by Even More Sophisticated Cyber Attacks

Operation Emmental
Security experts at Trend Micro have recently uncovered a hacking campaign dubbed “Operation Emmental” which targeted Swiss bank accounts with a multi-faceted attack.

Bad actors were able to bypass […]