877.791.9571 |

About the Author:

Pierluigi Paganini is Chief Information Security Officer at Bit4Id, firm leader in identity management, member of the ENISA (European Union Agency for Network and Information Security)Treat Landscape Stakeholder Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at Cyber Defense magazine, Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to create the blog "Security Affairs," recently named a Top National Security Resource for US. Pierluigi is a member of the The Hacker News team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News magazine and for many other security magazines. He is the author of the books The Deep Dark Web and Digital Virtual Currency and Bitcoin.
3dPrint10132014

Evolution of 3D Printing Technology Raises Security Concerns

Introduction
Also known as the term additive manufacturing (AM), 3D printing is a process for making a three-dimensional object of almost any shape starting from a 3D model or other […]

Cost-10072014

Pricing Policies in the Cyber Criminal Underground

Introduction
Underground markets are places on the Internet where criminal gangs offer a wide range of illegal products and services. Black markets are crowded places where single individuals or criminal […]

bashBug09272014

Exploiting and Verifying Shellshock: CVE-2014-6271

Everything you need to know about the Bash Bug vulnerability
The Bash Bug vulnerability (CVE-2014-6271)
A new critical vulnerability, remotely exploitable, dubbed “Bash Bug”, is threatening billions of machines all over […]

Healthcare09162014

Risks and Cyber Threats to the Healthcare Industry

Introduction
Every day, our digital identity is menaced by several cyber threats that are becoming even more sophisticated. Every year, data breaches expose million of records that are used by […]

icloud-security-09032014

Alleged Hack of iCloud Exposed Nude Photos of Celebrities Online

The case
The gossip news of this week is the alleged hack of Apple’s iCloud of many celebrities. Hundreds of naked photos purportedly belonging to more than one hundred actors […]

HackTrafficLight09022014

Hacking traffic light systems

Traffic light systems security issues
We often see movie scenes in which hackers are able to hack systems for the control of traffic lights, with catastrophic consequences, unfortunately we must […]

SIGINT08262014

MonsterMind, HACIENDA: How Intelligence is Threatening “Our” Cyberspace

Five Eyes and more
In the last twelve months, whistleblower Edward Snowden has revealed to the public how invasive is the cyber strategy of the US government and its cyber […]

Operation-Emmental-08152014

Operation Emmental: Banking Hit by Even More Sophisticated Cyber Attacks

Operation Emmental
Security experts at Trend Micro have recently uncovered a hacking campaign dubbed “Operation Emmental” which targeted Swiss bank accounts with a multi-faceted attack.

Bad actors were able to bypass […]

HackingTor08062014

Hacking Tor and Online Anonymity

Introduction
Tor is the acronym of “The onion router”, a system implemented to preserve online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers that […]

CyberCrimeDigitalCert07282014

How Cybercrime Exploits Digital Certificates

What is a digital certificate?
The digital certificate is a critical component of a public key infrastructure. It is an electronic document that associates the individual identity of a person […]

IndepenAPTs07162014

DragonFly, Cosmic Duke and Pitty Tiger: From State-Sponsored Espionage to Campaign of Independent APTs

Introduction
Cyber espionage is one of the most aggressive cyber threats for private companies and government entities. In recent years, the number of cyber attacks having this finality has increased […]

ISIS-07082014

Islamic State of Iraq and Syria (ISIS) a Global Threat: Analysis of the Effects on Cyberspace of the Iraqi Situation

What is ISIS and why it is menacing the world?
The Islamic State of Iraq and Syria and Islamic State of Iraq and al-Sham, also known as ISIS, is an […]

RussianFlag07012014

How Russia Controls the Internet

Russia and Internet Freedom
The Russian government is increasing its pressure on social media. Many experts maintain that the population is suffering a serious online censorship. The analysts have noted […]

russian06172014

Russia and Ukraine: Information Warfare

The Current Situation
The fighting in Ukraine has escalated sharply since the elections on May 25th. President-elect Petro Poroshenko, backed by the European Union and US, ordered the national army […]

HBleed06062014

Vulnerabilities in OpenSSL and GnuTLS: An Earthquake in Internet Encryption

HeartBleed … the Internet encryption earthquake
The first serious earthquake in the encryption world is the disclosure of the Heartbleed vulnerability (CVE-2014-0160), a serious flaw in the popular OpenSSL library […]

civil-drone-04252014

Hack-Proof Drones Possible with HACMS Technology

Introduction
Unmanned Aerial Vehicles (UAVs) are one of the most flexible and useful solutions adopted by the military and private industries. Drones could be used in commercial contexts as in […]

DNS-sinkhole05282014

Sinkholes: Legal and Technical Issues in the Fight against Botnets

Introduction
The security community is observing a sensible increase of botnet activities, in particular of cloud-hosted botnets that are mainly based on the Amazon cloud architecture.

Amazon isn’t the only provider […]

dataBreach05092014

2013 Data Breaches: All You Need to Know

Introduction: Statistics
2013 may be remembered as the “year of the retailer breach”. This statement was reported in the last Verizon Data Breach Investigation Report 2014, and reminds us that […]

civil-drone-04252014

Privacy and Security Issues for the Usage of Civil Drones

In December, Amazon.com, the world’s largest online retailer, announced that it is testing unmanned drones to deliver products ordered by its customers. The service was experimental, and it could […]

Pierluigi-04082014

Cyber Threats against the Aviation Industry

Introduction
The recent incident to the Malaysia Airlines Flight MH370 is fueling the discussion of whether would be possible to hack into an airplane and gain complete control control of […]