877.791.9571 |

About the Author:

Pierluigi Paganini is Chief Information Security Officer at Bit4Id, firm leader in identity management, member of the ENISA (European Union Agency for Network and Information Security)Treat Landscape Stakeholder Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at Cyber Defense magazine, Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to create the blog "Security Affairs," recently named a Top National Security Resource for US. Pierluigi is a member of the The Hacker News team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News magazine and for many other security magazines. He is the author of the books The Deep Dark Web and Digital Virtual Currency and Bitcoin.
Surveillance09122013

NSA Surveillance Is Changing Users’ Internet Experience

Introduction
Edward Snowden is the former technical assistant for the U.S. Intelligence whose revelations on U.S. surveillance programs have changed the way Internet users live their online experience more than […]

socialbot-09032013

PsyOps and Socialbots

Introduction
Social media are the principal aggregation “places” in cyberspace; billions of connected people are using it for a wide variety of purposes from gaming to socialization.

The high penetration […]

databaseVulnerab08262013

Databases—Vulnerabilities, Costs of Data Breaches and Countermeasures

Introduction
This post introduces principal database vulnerabilities, providing an overview of the possible effects for their exploitation. For each database vulnerability, the principal cyber threats are exposed and a few […]

cyber-crime08072013

Cybercrime as a Service

Reading about cybercrime, it is very easy to find terms such as attacks-as-a-service, malware-as-a-service and fraud-as-s-Service, that are commonly used to describe the practice of facilitating illegal activities for […]

Edward-Snowden07252013

How Edward Snowden protected information … and his life

Who is Edward Snowden?
Edward Snowden is the man who changed the history of the Internet; he revealed information on the largest and most secret surveillance program implemented by the […]

offense07182013

The Offensive Approach to Cyber Security in Government and Private Industry

Cyber security goes to the offensive, governments, intelligence agencies, law enforcement and private companies are evaluating the possibility to adopt an offensive approach to defend their assets from cyber-attacks […]

palantir-logo-07092013

The Palantir Technologies model, lights and shadows on a case of success

Introduction
In this article one of the most debated intelligence company is presented: the Palantir Technologies, a firm that is recognized as one of most brilliant providers for data analysis […]

ProjectArtemis-07012013

Project Artemis – OSINT activities on Deep Web

Introduction
During the last months I was a member of the board for a project titled Artemis, a research project that I started with my co-author Richard Amores to better […]

PRISM_logo-06242013

PRISM – Facts, Doubts, Laws and Loopholes

Introduction
Edward Snowden is the name of a 29-year-old technical assistant for the Central Intelligence Agency who disclosed the largest surveillance program implemented by the US known as the PRISM […]

NFC-06182013

Near Field Communication (NFC) Technology, Vulnerabilities and Principal Attack Schema

Introduction
The Near Field Communication (NFC) is a set of standards for mobile devices designed to establish radio communication with each other by being touched together or brought within a […]

US-vs-China06102013

China vs US, cyber superpowers compared

Introduction
In the last months, the press agencies and government official bulletins have reported several news regarding continuous cyber-attacks having Chinese origin, most of them with cyber espionage purpose, but […]

HackingDrones06042013

Hacking Drones … Overview of the Main Threats

Introduction
The Unmanned Aerial Vehicles (UAVs), also known as drones, represent a revolution in the security context; these powerful systems could be used in various contexts such as military and […]

DDosAttack-feature

Dangerous DDoS (Distributed Denial of Service) on the rise

Introduction
Contrary to what you might believe, DDoS (Distributed Denial of Service) attacks are considerable, a serious cyber threat able interrupt a web service provided by an organization causing serious […]

bitcoin

How to profit illegally from Bitcoin … cybercrime and much more

Introduction
The interest in Bitcoin, one of the most popular currency schemas is high, financial world, small savers, merchants and of course, cyber-criminals observing with interest the strong surge of […]

Botnet Hunting

Botnets and Cybercrime – Botnets hunting – Part 3

Botnets and cybercrime – Introduction can be found here
Botnets, how do they work? Architectures and case studies – Part 2 can be found here
Introduction
Security experts use several key technologies […]

Botnets and cybercrime – Introduction

Botnets, how do they work? Architectures and case studies – Part 2

In the first part of this of this mini-series on the botnet cyber threat, we have shown the current scenario and the technological evolution in security landscape. Malicious architectures […]

Botnets and cybercrime – Introduction

Botnets and cybercrime – Introduction

Preface
One of the most insidious cyber threats for security community is represented by diffusion of botnets, networks of infected computers (bots or zombies) managed by attackers due the inoculation […]

CyberEspionage-03282013

TeamSpy, Miniduke, Red October, and Flame: Analyzing Principal Cyber Espionage Campaigns

Even a layman would notice that cyberspace is in full storm; different entities are increasing malicious activities pursuing various purposes, and cyber espionage is considered one of the principal […]

Mobile-Security-03252013

Importance of security in mobile platforms

Introduction
In this period, security firms are publishing detailed reports on analysis conducted on principal cyber threats detected in 2012, the results proposed present a landscape dominated by explosion of […]

deep-web-031313

Diving in the Deep Web

Introduction
“Deep Web”, also known as “hidden web”, is a term that evokes the unknown, a mysterious place in the cyber space populated by criminals and hackers that is not […]