877.791.9571 |

About the Author:

Pierluigi Paganini is Chief Information Security Officer at Bit4Id, firm leader in identity management, member of the ENISA (European Union Agency for Network and Information Security)Treat Landscape Stakeholder Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at Cyber Defense magazine, Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to create the blog "Security Affairs," recently named a Top National Security Resource for US. Pierluigi is a member of the The Hacker News team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News magazine and for many other security magazines. He is the author of the books The Deep Dark Web and Digital Virtual Currency and Bitcoin.

Hacking Tor and Online Anonymity

Tor is the acronym of “The onion router”, a system implemented to preserve online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers that […]


How Cybercrime Exploits Digital Certificates

What is a digital certificate?
The digital certificate is a critical component of a public key infrastructure. It is an electronic document that associates the individual identity of a person […]


DragonFly, Cosmic Duke and Pitty Tiger: From State-Sponsored Espionage to Campaign of Independent APTs

Cyber espionage is one of the most aggressive cyber threats for private companies and government entities. In recent years, the number of cyber attacks having this finality has increased […]


Islamic State of Iraq and Syria (ISIS) a Global Threat: Analysis of the Effects on Cyberspace of the Iraqi Situation

What is ISIS and why it is menacing the world?
The Islamic State of Iraq and Syria and Islamic State of Iraq and al-Sham, also known as ISIS, is an […]


How Russia Controls the Internet

Russia and Internet Freedom
The Russian government is increasing its pressure on social media. Many experts maintain that the population is suffering a serious online censorship. The analysts have noted […]


Russia and Ukraine: Information Warfare

The Current Situation
The fighting in Ukraine has escalated sharply since the elections on May 25th. President-elect Petro Poroshenko, backed by the European Union and US, ordered the national army […]


Vulnerabilities in OpenSSL and GnuTLS: An Earthquake in Internet Encryption

HeartBleed … the Internet encryption earthquake
The first serious earthquake in the encryption world is the disclosure of the Heartbleed vulnerability (CVE-2014-0160), a serious flaw in the popular OpenSSL library […]


Hack-Proof Drones Possible with HACMS Technology

Unmanned Aerial Vehicles (UAVs) are one of the most flexible and useful solutions adopted by the military and private industries. Drones could be used in commercial contexts as in […]


Sinkholes: Legal and Technical Issues in the Fight against Botnets

The security community is observing a sensible increase of botnet activities, in particular of cloud-hosted botnets that are mainly based on the Amazon cloud architecture.

Amazon isn’t the only provider […]


2013 Data Breaches: All You Need to Know

Introduction: Statistics
2013 may be remembered as the “year of the retailer breach”. This statement was reported in the last Verizon Data Breach Investigation Report 2014, and reminds us that […]


Privacy and Security Issues for the Usage of Civil Drones

In December, Amazon.com, the world’s largest online retailer, announced that it is testing unmanned drones to deliver products ordered by its customers. The service was experimental, and it could […]


Cyber Threats against the Aviation Industry

The recent incident to the Malaysia Airlines Flight MH370 is fueling the discussion of whether would be possible to hack into an airplane and gain complete control control of […]


From Turbine to Quantum: Implants in the Arsenal of the NSA

The revelations of Edward Snowden totally changed our perception of NSA cyber capabilities. Day by day, the IT security community is reading about secret surveillance programs, exploits, and automated […]


Crimea – The Russian Cyber Strategy to Hit Ukraine

The year 2014 started with a diplomatic crisis in Crimes and Ukraine. The tension rose just after the 2014 Ukrainian revolution, in which the government of President Viktor Yanukovych […]


Car Hacking: You Cannot Have Safety without Security

The theme of the car hacking is increasingly discussed by the media and within the security community. At one time, the exploits of hackers that have hijacked a car […]


Lights and shadows on the capabilities of the NSA

The documents leaked by Edward Snowden revealed to the world the amazing spying machine built by US intelligence, its capabilities appears virtually infinite, the US agents, in fact, are […]


Malware-based Attacks Against POS Systems


A sequence of data breaches suffered by principal US retailers Target and Neiman Marcus has put Americans on alert. A total of more than a hundred million people may […]


A Close Look at the NSA Monitor Catalog – Server Hacking

Summing up what happened, Der Spiegel published an internal NSA catalog that contains detailed information on spies’ backdoors used by the agencies and designed to compromise a wide range […]


Introduction to the Business of Stolen Card Data

I receive many questions from people who don’t work in the security field about the use of stolen credit card data in the cyber-crime ecosystem, so I decided to […]


How the NSA Monitors Target Computers with Radar Wave Devices

Germany’s Der Spiegel has published a couple of disturbing articles on the NSA surveillance activities. The media agency has focused its articles on the Advanced/Access Network Technology (ANT) division […]