877.791.9571 |

About the Author:

Pierluigi Paganini is Chief Information Security Officer at Bit4Id, firm leader in identity management, member of the ENISA (European Union Agency for Network and Information Security)Treat Landscape Stakeholder Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at Cyber Defense magazine, Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to create the blog "Security Affairs," recently named a Top National Security Resource for US. Pierluigi is a member of the The Hacker News team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News magazine and for many other security magazines. He is the author of the books The Deep Dark Web and Digital Virtual Currency and Bitcoin.
NFC-06182013

Near Field Communication (NFC) Technology, Vulnerabilities and Principal Attack Schema

Introduction
The Near Field Communication (NFC) is a set of standards for mobile devices designed to establish radio communication with each other by being touched together or brought within a […]

US-vs-China06102013

China vs US, cyber superpowers compared

Introduction
In the last months, the press agencies and government official bulletins have reported several news regarding continuous cyber-attacks having Chinese origin, most of them with cyber espionage purpose, but […]

HackingDrones06042013

Hacking Drones … Overview of the Main Threats

Introduction
The Unmanned Aerial Vehicles (UAVs), also known as drones, represent a revolution in the security context; these powerful systems could be used in various contexts such as military and […]

DDosAttack-feature

Dangerous DDoS (Distributed Denial of Service) on the rise

Introduction
Contrary to what you might believe, DDoS (Distributed Denial of Service) attacks are considerable, a serious cyber threat able interrupt a web service provided by an organization causing serious […]

bitcoin

How to profit illegally from Bitcoin … cybercrime and much more

Introduction
The interest in Bitcoin, one of the most popular currency schemas is high, financial world, small savers, merchants and of course, cyber-criminals observing with interest the strong surge of […]

Botnet Hunting

Botnets and Cybercrime – Botnets hunting – Part 3

Botnets and cybercrime – Introduction can be found here
Botnets, how do they work? Architectures and case studies – Part 2 can be found here
Introduction
Security experts use several key technologies […]

Botnets and cybercrime – Introduction

Botnets, how do they work? Architectures and case studies – Part 2

In the first part of this of this mini-series on the botnet cyber threat, we have shown the current scenario and the technological evolution in security landscape. Malicious architectures […]

Botnets and cybercrime – Introduction

Botnets and cybercrime – Introduction

Preface
One of the most insidious cyber threats for security community is represented by diffusion of botnets, networks of infected computers (bots or zombies) managed by attackers due the inoculation […]

CyberEspionage-03282013

TeamSpy, Miniduke, Red October, and Flame: Analyzing Principal Cyber Espionage Campaigns

Even a layman would notice that cyberspace is in full storm; different entities are increasing malicious activities pursuing various purposes, and cyber espionage is considered one of the principal […]

Mobile-Security-03252013

Importance of security in mobile platforms

Introduction
In this period, security firms are publishing detailed reports on analysis conducted on principal cyber threats detected in 2012, the results proposed present a landscape dominated by explosion of […]

deep-web-031313

Diving in the Deep Web

Introduction
“Deep Web”, also known as “hidden web”, is a term that evokes the unknown, a mysterious place in the cyber space populated by criminals and hackers that is not […]

SCADA-02222013

SCADA & Security of Critical Infrastructures

,

Introduction
In the last few years there has been an increase within the worldwide security community consciousness of the risks related to cyber-attacks against critical infrastructures of a countries; an […]

CyberEspionage-02122013

Cyber-espionage: The greatest transfer of wealth in history

Introduction
In recent months, the world-wide security community has discovered many cyber espionage campaigns that hit governments, intelligence agencies and private industry. The majority of them were related to state-sponsored […]

facebook-soldier-sized

Social Media use in the Military Sector

Introduction
Social media has assumed a fundamental role in today’s society. It is a technology with the highest penetration level, as billions of people are connected through the principal global […]

Cyber-Crime-sized

Cybercrime and the Underground Market

Introduction
Technology is invading our lives. Every day we perform a multitude of operations using computing devices; we check out bank account balance, we pay parking and we exchange documents […]

BYOD-sized

Importance of a BYOD Policy for Companies

Introduction
The IT landscape is dominated by the rise of paradigms such as cloud computing, mobile networking, and social networking, three concepts that have totally revolutionized the daily user’s experience […]

phishing-sized

Phishing: A Very Dangerous Cyber Threat

Introduction
In recent years, phishing attacks have increased exponentially, targeting every sector of society. Despite the simplicity of the schema implemented, they have been successful in a majority of the […]

information-security

A World of Vulnerabilities

Introduction
Every day, we read about cyber-attacks and data breaches, incidents that represent in many cases a disaster for private companies and governments. Technology plays a significant role in our […]

internet anonymity

Introduction to Anonymizing Networks – Tor vs I2P

The Right to Anonymity

Every operation made in cyber space, every visited web site, and every web service accessed, leave traces of the user’s experience on the Internet. This information […]

110612_1213_IncreasingC1.jpg

Increasing Concerns on Social Media Monitoring, from Governments to Private Businesses

Whenever we surf on the web we disseminate a large amount of information that could be used for different purposes. Contrary to what you might believe, this information is […]