877.791.9571 |

About the Author:

Pierluigi Paganini is Chief Information Security Officer at Bit4Id, firm leader in identity management, member of the ENISA (European Union Agency for Network and Information Security)Treat Landscape Stakeholder Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at Cyber Defense magazine, Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to create the blog "Security Affairs," recently named a Top National Security Resource for US. Pierluigi is a member of the The Hacker News team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News magazine and for many other security magazines. He is the author of the books The Deep Dark Web and Digital Virtual Currency and Bitcoin.
DNS-sinkhole05282014

Sinkholes: Legal and Technical Issues in the Fight against Botnets

Introduction
The security community is observing a sensible increase of botnet activities, in particular of cloud-hosted botnets that are mainly based on the Amazon cloud architecture.

Amazon isn’t the only provider […]

dataBreach05092014

2013 Data Breaches: All You Need to Know

Introduction: Statistics
2013 may be remembered as the “year of the retailer breach”. This statement was reported in the last Verizon Data Breach Investigation Report 2014, and reminds us that […]

civil-drone-04252014

Privacy and Security Issues for the Usage of Civil Drones

In December, Amazon.com, the world’s largest online retailer, announced that it is testing unmanned drones to deliver products ordered by its customers. The service was experimental, and it could […]

Pierluigi-04082014

Cyber Threats against the Aviation Industry

Introduction
The recent incident to the Malaysia Airlines Flight MH370 is fueling the discussion of whether would be possible to hack into an airplane and gain complete control control of […]

NSA-reload-03242014

From Turbine to Quantum: Implants in the Arsenal of the NSA

Introduction
The revelations of Edward Snowden totally changed our perception of NSA cyber capabilities. Day by day, the IT security community is reading about secret surveillance programs, exploits, and automated […]

crimea03112014

Crimea – The Russian Cyber Strategy to Hit Ukraine

Introduction
The year 2014 started with a diplomatic crisis in Crimes and Ukraine. The tension rose just after the 2014 Ukrainian revolution, in which the government of President Viktor Yanukovych […]

CarHacking02282014

Car Hacking: You Cannot Have Safety without Security

Introduction
The theme of the car hacking is increasingly discussed by the media and within the security community. At one time, the exploits of hackers that have hijacked a car […]

NSA-control-web02212014

Lights and shadows on the capabilities of the NSA

Introduction
The documents leaked by Edward Snowden revealed to the world the amazing spying machine built by US intelligence, its capabilities appears virtually infinite, the US agents, in fact, are […]

POS-Malware02112014

Malware-based Attacks Against POS Systems

,

Introduction
A sequence of data breaches suffered by principal US retailers Target and Neiman Marcus has put Americans on alert. A total of more than a hundred million people may […]

JTAG01272014

A Close Look at the NSA Monitor Catalog – Server Hacking

Introduction
Summing up what happened, Der Spiegel published an internal NSA catalog that contains detailed information on spies’ backdoors used by the agencies and designed to compromise a wide range […]

CardingProcess01142014

Introduction to the Business of Stolen Card Data

Introduction
I receive many questions from people who don’t work in the security field about the use of stolen credit card data in the cyber-crime ecosystem, so I decided to […]

NSA-Monitor01102014

How the NSA Monitors Target Computers with Radar Wave Devices

Introduction
Germany’s Der Spiegel has published a couple of disturbing articles on the NSA surveillance activities. The media agency has focused its articles on the Advanced/Access Network Technology (ANT) division […]

cybercrime-01082014

Cyber Security During The Holidays

Introduction
It’s the holidays, a key time for cybercrime that exploits the bad habits of unaware internet users. Attackers can defraud and monetize their actions with little effort. During the […]

Info-Security-12132013

Unordinary Predictions for Information Security in 2014

Introduction
The year is closing and it’s time for prediction of the evolution of the security landscape in 2014. It’s easy to predict an increase in the volume of cyber […]

scada-12062013

Improving SCADA System Security

Introduction
Supervisory control and data acquisition (SCADA) networks contain computers and software that perform critical tasks and provide essential services within critical infrastructure. They’re considered by cyber strategists to be […]

ExploitTools11112013

How Classified NSA Exploit tools RADON and DEWSWEEPER Work

,

The NSA FoxAcid Platform
Security expert Bruce Schneier is one of the most authoritative experts who revealed that the NSA has a wide-ranging arsenal of zero-day exploits to use for […]

phish-attack11052013

Modern Online Banking Cyber Crime

Introduction
In recent years, cyber crime has grown by leaps and bounds. Cyber crime revenue grew to levels comparable to that of a state, and major security analysts agree that […]

cybercrime11012013

2013 – The Impact of Cybercrime

Introduction
Recent studies published on the evolution of principal cyber threats in the security landscape. They present concerning scenarios, characterized by the constant growth of cyber criminal activities.

Even though the […]

imageManip10252013

Photo Forensics: Detect Photoshop Manipulation with Error Level Analysis

Introduction
Error Level Analysis is a forensic method to identify portions of an image with a different level of compression. The technique could be used to determine if a picture […]

backdoor_r1_c1

Hardware attacks, backdoors and electronic component qualification

Introduction
The capillary diffusion of technology in our society has an important consequence. Hardware has to be properly analyzed during acquisition and qualification phases of the supply chain. We’re surrounded […]