Cyber warfare

Pierluigi Paganini February 22, 2012
Critical infrastructures & manipulation of the name Anonymous

What are the main dangers for our infrastructures? Too much threats which any country is exposed. The situation is bleak, suddenly the sectors of defense found themselves vulnerable to cyber threats. Once nations shown their proud arms, flaunt power, intimidating opponents in this way. Today the way of fighting is radically changed, the battleground is […]

Pierluigi Paganini February 20, 2012
Stopped antivirus for Iran, controversial penalty

I have just read the news that Iran will be banned the purchase of antivirus systems, a kind of technological embargo with clear reference to the virus Stuxnet and the need of the country to prevent further infection to any control systems of critical infrastructures, nuclear plants first. The new has been made public by […]

Pierluigi Paganini February 17, 2012
Censorship – Why Anonymous is interested to the Great Firewall of China?

  The Chinese government is famous for the high level of monitoring implemented on the internet and in the specific on all the new social media, that is the modern form of censorship, a model that several countries all over the world are taking for example.  Nothing is changed, the government plans to continue censoring […]

Pierluigi Paganini February 15, 2012
Stuxnet “neutralized” – Who sows the wind storm gathers!

The news has caused much uproar in the scientific community, according European and U.S. officials and private experts the iranian scientists have isolated and made harmless the Stuxnet malware that has infected the control systems of the nuclear plants all over the country. For some years Iranian security experts are facing with this virus that is […]

Pierluigi Paganini February 13, 2012
Iran case … security threat and oil business

At this time we are seeing continuing propaganda operations of Iranian government that is trying to convince with its proclamations the public opinion regarding technical capacities in its possession. Military troops, nuclear weapons, and a cyber army ready to destroy any enemy stronghold in cyber space. Too much experts believe that in reality, the West rather […]

Pierluigi Paganini February 10, 2012
Anonymous, it could become a cyber weapon

The group of hacktivist known as Anonymous is considered as the uncontrollable variable in the cyber space capable of surprising us with striking operations worthy of the most skilled cyber army. Precisely this is the point, are we sure that the group’s operations are so difficult to control or predict? Are we able to mitigate the risks of exposure? […]

Pierluigi Paganini February 09, 2012
DDoS, IPv6 is an excuse to talk about

The day has come, Network service providers are reporting the first IPV6 distributed denial-of-service (DDoS) attacks and the event is extremly significat from a secutity point of view. The news has been reported in the Arbor Networks’ 7th Annual Worldwide Infrastructure Security Report. Despite this king of attacks remain relatively rare, the news must alert […]

Pierluigi Paganini February 07, 2012
Syria drama and impact on cyberspace

The situation in Syria aroused much concern in the world because it could trigger, in a highly unstable, a conflict that many have tended to avoid. The world, today unarmed, is witnessing a fierce crackdown led by President Bashar al-Assad, a massacre against an opposition that wants the removal of what is considered a dictator […]

Pierluigi Paganini February 06, 2012
Hacking satellite communications and possible implication

Once more to worry about is the real security of satellite infrastructures. In a technological civilization satellites play a vital role in the management and transmission of information of all kinds, satellites infact do the work in silent thet we enjoy every day, but often forget this crucial aspect. Are these powerful systems of communication […]

Pierluigi Paganini February 04, 2012
Underestimate the threat, a serious error

In recent years it has fully understood the offensive capability of the use of cyber weapons, highly efficient tools to move attacks and espionage operations in total coverage. The effectiveness of the cyber threat is linked not only to its intrinsic characteristics, but also to the choice of channel for its spread and in this […]