Monthly Archives: May 2013

Two-factor authentication, necessary but not sufficient to be safe

By Pierluigi Paganini, Editor-in-Chief, CDM May 31, 2013, 11:30 am EST Adoption of a two-factor authentication process is necessary to increase the robustness for authentication processes, but security is a […]

Posted in Uncategorized | Comments Off on Two-factor authentication, necessary but not sufficient to be safe

Watering hole attacks and exploit kits – Indian gov site case

By Pierluigi Paganini, Editor-in-Chief, CDM May 30, 2013, 11:30 am EST Number of Watering hole attacks is increasing; most of them based on well-known exploit kits. The case of compromised […]

Posted in Uncategorized | Comments Off on Watering hole attacks and exploit kits – Indian gov site case

New wave of cyber attacks from Iran hit US

By Pierluigi Paganini, Editor-in-Chief, CDM May 29, 2013, 04:30 pm EST New cyber attacks from Iran hit US enterprises focusing on energy sector, the offensive has been revealed by American […]

Posted in Uncategorized | Comments Off on New wave of cyber attacks from Iran hit US

US critical infrastructures under unceasing cyber attacks

By Pierluigi Paganini, Editor-in-Chief, CDM May 28, 2013, 11:30 am EST US Congressmen Ed Markey and Henry Waxman issued the report “Electric grid vulnerability” on the level of security for US critical […]

Posted in Uncategorized | Comments Off on US critical infrastructures under unceasing cyber attacks

Cost of cybercrime for UK Small Businesses

By Pierluigi Paganini, Editor-in-Chief, CDM May 27, 2013, 11:15 am EST The Federation of Small Businesses issued an interesting study on cost of cybercrime suffered by small businesses in the […]

Posted in Uncategorized | Comments Off on Cost of cybercrime for UK Small Businesses

Operation Hangover, the Indian Cyberattack Infrastructure

By Pierluigi Paganini, Editor-in-Chief, CDM May 24, 2013, 11:30 am EST Operation Hangover is the title of a report published by Norman Shark that details a sophisticated cyberattack infrastructure that appears to originate […]

Posted in Uncategorized | Comments Off on Operation Hangover, the Indian Cyberattack Infrastructure

LEVERAGING REFERENTIAL DATA FOR BETTER THREAT DETECTION

By Joe Magee, Chief Technology Officer, Vigilant, Inc. May 24, 2013, 11:30 am EST Security Information and Event Management (SIEM) technology has many benefits for organizations seeking answers to specific […]

Posted in Uncategorized | Comments Off on LEVERAGING REFERENTIAL DATA FOR BETTER THREAT DETECTION

Zero-day market, the governments are the main buyers

By Pierluigi Paganini, Editor-in-Chief, CDM May 22, 2013, 11:30 am EST Governments, and in particular US one, are principal buyers of zero-day vulnerabilities according a report published by Reuters. Zero-days […]

Posted in Uncategorized | Comments Off on Zero-day market, the governments are the main buyers

Google Company’s Surveillance Database hacked by same hackers who hit BigG in 2010

By Pierluigi Paganini, Editor-in-Chief, CDM May 22, 2013, 11:30 am EST Google data breach is reality and Google Company’s Surveillance Database has been violated by the same hackers who breached Google’network […]

Posted in Uncategorized | Comments Off on Google Company’s Surveillance Database hacked by same hackers who hit BigG in 2010

Nir Goldshlager reveals how to hack Facebook Apps

By Pierluigi Paganini, Editor-in-Chief, CDM May 21, 2013, 11:30 am EST The popular security expert Nir Goldshlager found  a serious vulnerability that allows attackers to post spoofed messages from any […]

Posted in Uncategorized | Comments Off on Nir Goldshlager reveals how to hack Facebook Apps

Warning: Hackers Can Destroy Your SCADA Supervision Station

SCADA Malware Infection In 2 Simple Steps   Live Online Demo: May 21st at 12pm EST  Signup Here In this live 20-minute demonstration you will see how easily a hacker can […]

Posted in Uncategorized | Comments Off on Warning: Hackers Can Destroy Your SCADA Supervision Station

WSIS Forum 2013 – Securing Cyberspace in a borderless world

By Pierluigi Paganini, Editor-in-Chief, CDM May 20, 2013, 11:30 am EST “Securing Cyberspace in a borderless world: Vision 2015 and Beyond” is the title of a High Level Dialogue that […]

Posted in Uncategorized | Comments Off on WSIS Forum 2013 – Securing Cyberspace in a borderless world

US Air Force notice on military use of social media

By Pierluigi Paganini, Editor-in-Chief, CDM May 20, 2013, 11:30 am EST In the recent months I had the opportunity to conduct an interesting study on the use of Social Media in the […]

Posted in Uncategorized | Comments Off on US Air Force notice on military use of social media

Group-IB Exclusive details on Kangoo botnet that hit Australian banks

By Pierluigi Paganini, Editor-in-Chief, CDM May 17, 2013, 11:30 am EST Group-IB researchers have detected a new botnet named Kangoo that infected more than 150 000 machines mainly targeting Australian […]

Posted in Uncategorized | Comments Off on Group-IB Exclusive details on Kangoo botnet that hit Australian banks

The offensive approach to cybersecurity, motivations and risks

By Pierluigi Paganini, Editor-in-Chief, CDM May 16, 2013, 05:00 pm EST Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to […]

Posted in Uncategorized | Comments Off on The offensive approach to cybersecurity, motivations and risks

Bloomberg data breach, online 10,000 private messages

By Pierluigi Paganini, Editor-in-Chief, CDM May 15, 2013, 11:30 am EST Bloomberg was the victim of an accident data breach; shocking  news reported that financial data and news service posted online […]

Posted in Uncategorized | Comments Off on Bloomberg data breach, online 10,000 private messages

Apple decrypts seized iPhones for law enforcement

By Pierluigi Paganini, Editor-in-Chief, CDM May 14, 2013, 11:30 am EST Apple can “bypass the security software” if it chooses, accorind ATF no law enforcement agency could unlock a defendant’s iPhone except […]

Posted in Uncategorized | Comments Off on Apple decrypts seized iPhones for law enforcement

Bank robbery Global Network of cyber criminals stole $45m from ATMs

By Pierluigi Paganini, Editor-in-Chief, CDM May 13, 2013, 11:30 am EST The news on the biggest bank robbery with a cyber attack against ATMs in the history is conquering the […]

Posted in Uncategorized | Comments Off on Bank robbery Global Network of cyber criminals stole $45m from ATMs

A new version of DIY Google Dorks based hacking tool has been released, it is an extremely useful tool for reconnaissance of targets.

By Pierluigi Paganini, Editor-in-Chief, CDM May 10, 2013, 11:30 am EST A Webroot blog post announced that a new version of DIY Google Dorks based hacking tool has been released in the […]

Posted in Uncategorized | Comments Off on A new version of DIY Google Dorks based hacking tool has been released, it is an extremely useful tool for reconnaissance of targets.

QinetiQ breached by long Chinese cyber espionage campaign

By Pierluigi Paganini, Editor-in-Chief, CDM May 09, 2013, 11:30 am EST Bloomberg published a report on QinetiQ data breach, the company has been compromised from 2007 to 2012 by Chinese […]

Posted in Uncategorized | Comments Off on QinetiQ breached by long Chinese cyber espionage campaign

OpUSA, Anonymous against US Banking and government offices

By Pierluigi Paganini, Editor-in-Chief, CDM May 09, 2013, 11:30 am EST OpUSA campaing is officially started, the day has come, May 7 as announced by Anonymous, a coordinated online attack will hit Banking and government websites. The […]

Posted in Uncategorized | Comments Off on OpUSA, Anonymous against US Banking and government offices

RSA Conference Asia Pacific 2013

Early Bird Registration – Ends May 10, 2013 Early Bird registration discount is coming to a close! Don’t miss out on your chance to save S$150 and experience the collaboration, […]

Posted in Uncategorized | Comments Off on RSA Conference Asia Pacific 2013

APWG Mobile Financial Fraud report & mobile black market

By Pierluigi Paganini, Editor-in-Chief, CDM May 06, 2013, 11:30 am EST APWG published the interesting study APWG Mobile Financial Fraud report on the underground marketplace that revealed the explosion of […]

Posted in Uncategorized | Comments Off on APWG Mobile Financial Fraud report & mobile black market

The Challenges of Near Real-Time Situational Awareness

by Lee Vorthman, Cyber Lead NetApp U.S. Public Sector Within the last ten years it has become readily apparent that traditional perimeter defenses are no longer sufficient to secure our […]

Posted in Uncategorized | Comments Off on The Challenges of Near Real-Time Situational Awareness

US Army Corps of Engineers’ National Inventory of Dams (NID) were hacked

By Pierluigi Paganini, Editor-in-Chief, CDM May 3, 2013, 11:30 am EST The systems of the US Army Corps of Engineers’ National Inventory of Dams (NID) were hacked back in January […]

Posted in Uncategorized | Comments Off on US Army Corps of Engineers’ National Inventory of Dams (NID) were hacked

APWG issued the new edition of its APWG Global Phishing Survey report that identifies trends and their significance by quantifying the scope of the global phishing problem.

By Pierluigi Paganini, Editor-in-Chief, CDM May 2, 2013, 11:30 am EST The APWG Global Phishing Survey report analyzes phishing attacks detected in the second H2 2012, the overall data for the study was collected […]

Posted in Uncategorized | Comments Off on APWG issued the new edition of its APWG Global Phishing Survey report that identifies trends and their significance by quantifying the scope of the global phishing problem.

Advanced Mobile Security in the Age of Consumerization

By Bruce Gilley President, Fixmo US May 2, 2013, 11:30 am EST The new age of mobile computing is upon us and it reminds me of a good horror film: […]

Posted in Uncategorized | Comments Off on Advanced Mobile Security in the Age of Consumerization

Adobe Systems’ Reader vulnerability reveals where a PDF is opened

By Pierluigi Paganini, Editor-in-Chief, CDM May 1, 2013, 11:30 am EST The McAfee security firm found an Adobe Reader vulnerability that reveals where a PDF document is opened. The McAfee security firm found […]

Posted in Uncategorized | Comments Off on Adobe Systems’ Reader vulnerability reveals where a PDF is opened

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X