877.791.9571 |

About the Author:

Pierluigi Paganini is Chief Information Security Officer at Bit4Id, firm leader in identity management, member of the ENISA (European Union Agency for Network and Information Security)Treat Landscape Stakeholder Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at Cyber Defense magazine, Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to create the blog "Security Affairs," recently named a Top National Security Resource for US. Pierluigi is a member of the The Hacker News team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News magazine and for many other security magazines. He is the author of the books The Deep Dark Web and Digital Virtual Currency and Bitcoin.

Unordinary Predictions for Information Security in 2014

The year is closing and it’s time for prediction of the evolution of the security landscape in 2014. It’s easy to predict an increase in the volume of cyber […]


Improving SCADA System Security

Supervisory control and data acquisition (SCADA) networks contain computers and software that perform critical tasks and provide essential services within critical infrastructure. They’re considered by cyber strategists to be […]


How Classified NSA Exploit tools RADON and DEWSWEEPER Work


The NSA FoxAcid Platform
Security expert Bruce Schneier is one of the most authoritative experts who revealed that the NSA has a wide-ranging arsenal of zero-day exploits to use for […]


Modern Online Banking Cyber Crime

In recent years, cyber crime has grown by leaps and bounds. Cyber crime revenue grew to levels comparable to that of a state, and major security analysts agree that […]


2013 – The Impact of Cybercrime

Recent studies published on the evolution of principal cyber threats in the security landscape. They present concerning scenarios, characterized by the constant growth of cyber criminal activities.

Even though the […]


Photo Forensics: Detect Photoshop Manipulation with Error Level Analysis

Error Level Analysis is a forensic method to identify portions of an image with a different level of compression. The technique could be used to determine if a picture […]


Hardware attacks, backdoors and electronic component qualification

The capillary diffusion of technology in our society has an important consequence. Hardware has to be properly analyzed during acquisition and qualification phases of the supply chain. We’re surrounded […]


Hacktivism: Means and Motivations … What Else?

The term “hacktivism,” derived by combining hack and activism, refers to the use of computers and any other IT system and network to debate and sustain a political issue, […]


Hacking Satellites … Look Up to the Sky

Satellites have assumed a crucial role in our contemporary society; they are used in both private and public sectors for numerous purposes, from communication to research. Unfortunately, with the […]


NSA Surveillance Is Changing Users’ Internet Experience

Edward Snowden is the former technical assistant for the U.S. Intelligence whose revelations on U.S. surveillance programs have changed the way Internet users live their online experience more than […]


PsyOps and Socialbots

Social media are the principal aggregation “places” in cyberspace; billions of connected people are using it for a wide variety of purposes from gaming to socialization.

The high penetration […]


Databases—Vulnerabilities, Costs of Data Breaches and Countermeasures

This post introduces principal database vulnerabilities, providing an overview of the possible effects for their exploitation. For each database vulnerability, the principal cyber threats are exposed and a few […]


Cybercrime as a Service

Reading about cybercrime, it is very easy to find terms such as attacks-as-a-service, malware-as-a-service and fraud-as-s-Service, that are commonly used to describe the practice of facilitating illegal activities for […]


How Edward Snowden protected information … and his life

Who is Edward Snowden?
Edward Snowden is the man who changed the history of the Internet; he revealed information on the largest and most secret surveillance program implemented by the […]


The Offensive Approach to Cyber Security in Government and Private Industry

Cyber security goes to the offensive, governments, intelligence agencies, law enforcement and private companies are evaluating the possibility to adopt an offensive approach to defend their assets from cyber-attacks […]


The Palantir Technologies model, lights and shadows on a case of success

In this article one of the most debated intelligence company is presented: the Palantir Technologies, a firm that is recognized as one of most brilliant providers for data analysis […]


Project Artemis – OSINT activities on Deep Web

During the last months I was a member of the board for a project titled Artemis, a research project that I started with my co-author Richard Amores to better […]


PRISM – Facts, Doubts, Laws and Loopholes

Edward Snowden is the name of a 29-year-old technical assistant for the Central Intelligence Agency who disclosed the largest surveillance program implemented by the US known as the PRISM […]


Near Field Communication (NFC) Technology, Vulnerabilities and Principal Attack Schema

The Near Field Communication (NFC) is a set of standards for mobile devices designed to establish radio communication with each other by being touched together or brought within a […]


China vs US, cyber superpowers compared

In the last months, the press agencies and government official bulletins have reported several news regarding continuous cyber-attacks having Chinese origin, most of them with cyber espionage purpose, but […]