877.791.9571 |

About the Author:

Pierluigi Paganini is Chief Information Security Officer at Bit4Id, firm leader in identity management, member of the ENISA (European Union Agency for Network and Information Security)Treat Landscape Stakeholder Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at Cyber Defense magazine, Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to create the blog "Security Affairs," recently named a Top National Security Resource for US. Pierluigi is a member of the The Hacker News team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News magazine and for many other security magazines. He is the author of the books The Deep Dark Web and Digital Virtual Currency and Bitcoin.

The Offensive Approach to Cyber Security in Government and Private Industry

Cyber security goes to the offensive, governments, intelligence agencies, law enforcement and private companies are evaluating the possibility to adopt an offensive approach to defend their assets from cyber-attacks […]


The Palantir Technologies model, lights and shadows on a case of success

In this article one of the most debated intelligence company is presented: the Palantir Technologies, a firm that is recognized as one of most brilliant providers for data analysis […]


Project Artemis – OSINT activities on Deep Web

During the last months I was a member of the board for a project titled Artemis, a research project that I started with my co-author Richard Amores to better […]


PRISM – Facts, Doubts, Laws and Loopholes

Edward Snowden is the name of a 29-year-old technical assistant for the Central Intelligence Agency who disclosed the largest surveillance program implemented by the US known as the PRISM […]


Near Field Communication (NFC) Technology, Vulnerabilities and Principal Attack Schema

The Near Field Communication (NFC) is a set of standards for mobile devices designed to establish radio communication with each other by being touched together or brought within a […]


China vs US, cyber superpowers compared

In the last months, the press agencies and government official bulletins have reported several news regarding continuous cyber-attacks having Chinese origin, most of them with cyber espionage purpose, but […]


Hacking Drones … Overview of the Main Threats

The Unmanned Aerial Vehicles (UAVs), also known as drones, represent a revolution in the security context; these powerful systems could be used in various contexts such as military and […]


Dangerous DDoS (Distributed Denial of Service) on the rise

Contrary to what you might believe, DDoS (Distributed Denial of Service) attacks are considerable, a serious cyber threat able interrupt a web service provided by an organization causing serious […]


How to profit illegally from Bitcoin … cybercrime and much more

The interest in Bitcoin, one of the most popular currency schemas is high, financial world, small savers, merchants and of course, cyber-criminals observing with interest the strong surge of […]

Botnet Hunting

Botnets and Cybercrime – Botnets hunting – Part 3

Botnets and cybercrime – Introduction can be found here
Botnets, how do they work? Architectures and case studies – Part 2 can be found here
Security experts use several key technologies […]

Botnets and cybercrime – Introduction

Botnets, how do they work? Architectures and case studies – Part 2

In the first part of this of this mini-series on the botnet cyber threat, we have shown the current scenario and the technological evolution in security landscape. Malicious architectures […]

Botnets and cybercrime – Introduction

Botnets and cybercrime – Introduction

One of the most insidious cyber threats for security community is represented by diffusion of botnets, networks of infected computers (bots or zombies) managed by attackers due the inoculation […]


TeamSpy, Miniduke, Red October, and Flame: Analyzing Principal Cyber Espionage Campaigns

Even a layman would notice that cyberspace is in full storm; different entities are increasing malicious activities pursuing various purposes, and cyber espionage is considered one of the principal […]


Importance of security in mobile platforms

In this period, security firms are publishing detailed reports on analysis conducted on principal cyber threats detected in 2012, the results proposed present a landscape dominated by explosion of […]


Diving in the Deep Web

“Deep Web”, also known as “hidden web”, is a term that evokes the unknown, a mysterious place in the cyber space populated by criminals and hackers that is not […]


SCADA & Security of Critical Infrastructures


In the last few years there has been an increase within the worldwide security community consciousness of the risks related to cyber-attacks against critical infrastructures of a countries; an […]


Cyber-espionage: The greatest transfer of wealth in history

In recent months, the world-wide security community has discovered many cyber espionage campaigns that hit governments, intelligence agencies and private industry. The majority of them were related to state-sponsored […]


Social Media use in the Military Sector

Social media has assumed a fundamental role in today’s society. It is a technology with the highest penetration level, as billions of people are connected through the principal global […]


Cybercrime and the Underground Market

Technology is invading our lives. Every day we perform a multitude of operations using computing devices; we check out bank account balance, we pay parking and we exchange documents […]


Importance of a BYOD Policy for Companies

The IT landscape is dominated by the rise of paradigms such as cloud computing, mobile networking, and social networking, three concepts that have totally revolutionized the daily user’s experience […]