About
Cyber Security Expert, Cybercrime Analyst, writer, author
Specialties: Security…
Articles by Pierluigi
Activity
-
New #malware ‘#ResolverRAT’ targets #healthcare, pharmaceutical firms https://lnkd.in/es4uZQvm #securityaffairs #hacking
New #malware ‘#ResolverRAT’ targets #healthcare, pharmaceutical firms https://lnkd.in/es4uZQvm #securityaffairs #hacking
Shared by Pierluigi Paganini
-
Malicious #NPM packages target #PayPal users https://lnkd.in/eY838VFH #securityaffairs #hacking
Malicious #NPM packages target #PayPal users https://lnkd.in/eY838VFH #securityaffairs #hacking
Shared by Pierluigi Paganini
-
Siamo entusiasti di annunciare la nostra collaborazione con Io Riparto per la VI edizione dal nome "Connessioni", un evento ibrido scelto a sostegno…
Siamo entusiasti di annunciare la nostra collaborazione con Io Riparto per la VI edizione dal nome "Connessioni", un evento ibrido scelto a sostegno…
Liked by Pierluigi Paganini
Experience
Education
Licenses & Certifications
-
Certified Ethical Hacker
EC Coucil London
Credential ID ID ECC913557
Publications
-
Malware... It’s all about you...
The Malta Independent (Newspaper)
The military strategist Carl von Clausewitz stated:
“All war presupposes human weakness and seeks to exploit it.”
Malicious software (malware) is software that is explicitly designed to exploit vulnerabilities in computing devices and human users to the malicious advantage of the malware author or malware user. Malware comes in many forms, including computer viruses, worms, trojan, spyware, ransom-ware, ad-ware, root kits, and so on.
In 2008, the number of devices connected to…The military strategist Carl von Clausewitz stated:
“All war presupposes human weakness and seeks to exploit it.”
Malicious software (malware) is software that is explicitly designed to exploit vulnerabilities in computing devices and human users to the malicious advantage of the malware author or malware user. Malware comes in many forms, including computer viruses, worms, trojan, spyware, ransom-ware, ad-ware, root kits, and so on.
In 2008, the number of devices connected to the Internet exceeded the number of people on earth: Smartphones, tablets, industrial control systems, smart grids, medical devices, environmental sensors (vibration, temperature, light, video, audio) and so on. According to CISCO, by 2020 that number will grow to 50 billion devices. In the EU vision of an “ambient intelligence” world, devices will work in concert to support people carrying out their everyday life activities, tasks, and rituals, in an easy natural way, using information and intelligence that is hidden within the network connecting these devices. As these devices shrink, and become more connected and integrated into our environment, the technology disappears into our surroundings until only the user interface remains perceivable by users. If this trend continues, billions of these invisible devices will be vulnerable to attacks and will be trivially subverted covertly against us.
One can try arguing that we have lived with computer vulnerabilities without a major crisis in the past, so why start worrying now? The problem is that the value in attacking these devices is growing exponentially, while our dependence on them increases. As more personal and business transactions are performed online, there is a clearer “return on investment” for attacking these systems.
....Other authorsSee publication -
Are your business operations secure?
The Malta Independent (Newspaper)
Today, the chief executive officers (CEOs) of many businesses are becoming aware of the need to ensure their IT systems are secured to protect their organisation, their customers, and their stakeholders. According to Brian Snow, former technical director of the US NSA’s Information Assurance Directorate:
“Data breaches and financial losses are now hurting every segment of the community, it’s a wake-up call. They are driving the community to become acutely aware of the (security)…Today, the chief executive officers (CEOs) of many businesses are becoming aware of the need to ensure their IT systems are secured to protect their organisation, their customers, and their stakeholders. According to Brian Snow, former technical director of the US NSA’s Information Assurance Directorate:
“Data breaches and financial losses are now hurting every segment of the community, it’s a wake-up call. They are driving the community to become acutely aware of the (security) weaknesses in current products and systems, and better yet, it forces an increasing awareness of the real need to fix things!”
In an effort to incentivise change in today’s business practices, proposed amendments to the EU Data Protection Law state:
“Companies found to have mishandled any personal data they hold – be it of their customers, suppliers or their own employees – will face “penalties of up to €1 million or up to two per cent of the global annual turnover of a company.”
The ultimate responsibility in the case of a data breach rests with the CEO. The role of the CEO is to ensure that cyber-security issues are adequately addressed within their organisation by ensuring adequate commitment of time and finances to support the process.
...Other authorsSee publication -
The ‘cyber war’ era began long ago
The Malta Independent (Newspaper)
US military strategist John Boyd states:
“War comprises acts of physical, biological, psychological, social, cultural and other destruction at all levels, for example, intrapsychic, interpersonal, intergroup, interorganisational, and international.”
Cyber warfare is combat in cyberspace and includes computers, the Internet and the “sphere of human thought” (Noosphere, Social Media). Cyber operations can be Kinetic (physical destruction) and Non-Kinetic (attacks against computers…US military strategist John Boyd states:
“War comprises acts of physical, biological, psychological, social, cultural and other destruction at all levels, for example, intrapsychic, interpersonal, intergroup, interorganisational, and international.”
Cyber warfare is combat in cyberspace and includes computers, the Internet and the “sphere of human thought” (Noosphere, Social Media). Cyber operations can be Kinetic (physical destruction) and Non-Kinetic (attacks against computers, intellectual property, financial systems, and the realm of ideas, opinions, beliefs and feelings). The boundaries between conventional operations (munitions, psychological) and cyber-operations is blurring, as cyber attacks begin to be used as a force multiplier in conventional operations.
Cyber warfare is generally different from cybercrime, with cybercrime seen as financially motivated, and cyber warfare as politically motivated. Cyber attacks that result in physical destruction of critical infrastructure or large loss of life are considered acts of war/terrorism. Cyber attacks can originate or be triggered from anywhere. Cyber warfare can be conducted by traditional nation-states and other actors. Paradoxically, cyber warfare can, and already does, take place during “peacetime” periods when there is no conventional conflict occurring.
...Other authorsSee publication -
Serious safety and security problems in automotive, aviation, aerospace and other cyber-physical systems (Part 2 of 2)
The Malta Independent (Newspaper)
Right now, the expert consensus is that civilian cyber-physical systems deployed today by many industries are frequently engineered using KNOWN UNSAFE practices. In this week’s article we look at the complex trends, dispositions, and behaviours, of organisations in the cyber-physical systems community today that limit the adoption of safety and security best practices. We will also explore the ICT Gozo Malta Project’s activities to overcome these barriers.
Other authorsSee publication -
Serious safety and security problems in automotive, aviation, aerospace and other cyber-physical systems
The Malta Independent (Newspaper)
Convergence in world leading research in Europe to tackle these problems (Part 1 of 2)
Other authorsSee publication -
Serious safety and security problems in automotive, aviation, aerospace and other cyber-physical systems
The Malta Independent (Newspaper)
Convergence in world leading research in Europe to tackle these problems (Part 1 of 2)
Other authorsSee publication -
International Collaboration to Bring You Authoritative Insider Perspectives on the Global Cyber Safety and Security Status (Part 4 of 4)
The Malta Independent (Newspaper)
Cyber security, civil liberties, our common welfare and the stability of Nations. How bad is the cyber security situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do to improve my situation and protect those I care about? This is the fourth article in this series that quotes cyber security insiders to progressively answer these important questions.
This week we talk about that 8000 pound elephant sitting in…Cyber security, civil liberties, our common welfare and the stability of Nations. How bad is the cyber security situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do to improve my situation and protect those I care about? This is the fourth article in this series that quotes cyber security insiders to progressively answer these important questions.
This week we talk about that 8000 pound elephant sitting in the room; we will recall how systematically poor governance decisions around the world has undermined the community and resulted in severe risks to National, Regional and Global stability.
Between 1970 and 2000, individuals and organizations concerned with protecting their personal privacy and corporate secrets were engaged in heated discussions with governments around the world. They wanted the response-ability to employ high assurance security techniques and technologies to safeguard their legitimate interests, and the legitimate interests of their stakeholders. i.e. The ability to defend their domain. During that period of time, policies and legislation discouraged or outright prevented the private sector from building genuinely secure computing systems for the civilian community. The Australian Government – Department of Defence – Defense Signals Directorate website ( http://dsd.gov.au ) openly promotes their mission statement as: “Reveal Their Secrets – Protect our Own”. Unfortunately in the past, in practice, most Governments around the world defined “Their Secrets” as the private or sensitive data of any person or organisation not part of their own Government. To ensure easy *covert* access to historically unprecedented amounts of sensitive data Governments around the world systematically undermined and prohibited effective civilian cyber security. ...Other authorsSee publication -
International collaboration to bring you insider perspectives on global cyber safety and security status (Part 3 of 4)
The Malta Independent (Newspaper)
Data-breaches, intellectual property loss and your money… We have all heard the headlines about the social and economic implications of cybercrime, but how bad is the situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do to improve my situation and protect those I care about?
his week we look at the perverse economic incentives driving cybercrime, how we got ourselves into this cyber mess, and explore the concept…Data-breaches, intellectual property loss and your money… We have all heard the headlines about the social and economic implications of cybercrime, but how bad is the situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do to improve my situation and protect those I care about?
his week we look at the perverse economic incentives driving cybercrime, how we got ourselves into this cyber mess, and explore the concept of due-care.
With our sincerest apologies to Jessie J and her song “Price Tag”, in the cyber espionage and freelancing underground cybercrime communities: “It’s all about the money, money, money. We want your money, money, money. We just want to hack your computer. Forget about your welfare. It’s about your (ha) Cha-Ching Cha-Ching. It’s about your (yeah) Ba-Bling Ba-Bling. Can you feel that (yeah). We’ll pay them with your credit card tonight…”
Unfortunately, cyber espionage and cyber crime are profitable industries that are immune to the current economic crisis and their own moral crisis. ....Other authorsSee publication -
Insider perspectives on the status of global cyber safety and security status (Part 2 of 4)
The Malta Independent (Newspaper)
Critical infrastructure protection, StuxNet, exploding computers, blackouts, collapsing banking systems, and cyber war!! None of us have escaped the headlines warning of impending cyber doom, but this is just sensationalism, right? How bad is the situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do to improve my situation and protect those I care about?
Weak cyber security is one of the most serious economic and…Critical infrastructure protection, StuxNet, exploding computers, blackouts, collapsing banking systems, and cyber war!! None of us have escaped the headlines warning of impending cyber doom, but this is just sensationalism, right? How bad is the situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do to improve my situation and protect those I care about?
Weak cyber security is one of the most serious economic and (inter)national security challenges we face today. In fact, it is argued by many world-leading experts that today’s cyber security risks place the stability of entire nations at risk. The US government position is: “It’s now clear this cyber threat is one of the most serious economic and national security challenges we face as a nation. It’s also clear that we’re not as prepared as we should be, as a government, or as a country.”
The UK government position, articulated in a rare public statement by Ian Lobban, Director General of the UK Government Communications Headquarters (GCHQ), is: “The UK’s critical infrastructure faces a ‘real and credible’ threat of cyber attack. It goes to the heart of our economic well-being and national interest.”
To quote Brian Snow, former Technical Director of the US NSA’s Information Assurance Directorate: “No (person or) organisation is immune and it is no longer credible to say: Not my problem!”Other authorsSee publication -
International collaboration brings you insider perspectives on global cyber safety and security status (Part 1 of 4)
The Malta Independent (Newspaper)
Today there is a lot of interest in “Cyber warfare” and “Cyber threats”. Week after week we are bombarded with news about massive security failures, one after the other. For example, according to the Utah Department of Health, the sensitive personal information of more than 780,000 people was stolen from a government health department computer in Utah, USA in March 2012. These ongoing reports leave many of us feeling unsure on what can be done. Is this just sensationalism? How bad is the…
Today there is a lot of interest in “Cyber warfare” and “Cyber threats”. Week after week we are bombarded with news about massive security failures, one after the other. For example, according to the Utah Department of Health, the sensitive personal information of more than 780,000 people was stolen from a government health department computer in Utah, USA in March 2012. These ongoing reports leave many of us feeling unsure on what can be done. Is this just sensationalism? How bad is the situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do to improve my situation and protect those I care about?
Each week, this easy to understand Cyber Security Awareness Series will quote cyber security insiders to answer these important questions. This four-part series is another example of international collaboration created by the ICT Gozo Malta Project, this time with experienced international security reporter Pierluigi Paganini, director and Ciso of Bit4ID, Italy. The series contributes to ongoing online publications of extensive cyber awareness resources during 2011 and 2012. These publications from Malta have been blogged and viewed by thousands of people including experts in government and industry around the globe.Other authorsSee publication
Projects
-
Cyberwarzone VIP
The goal of Cyberwarzone is to provide the world a portal with global cyberwar information. The effort in getting this cyberwarfare information is hard. But as the internet is growing we need to get an global cyberwar & cybercrime monitoring system.
https://www.facebook.com/CyberwarzoneOther creatorsSee project -
Founder Security Affairs
- Present
A blog that approaches security matters from every perspectives
-
Cyber Defense Magazine
-
Cyber Defense Magazine is by ETHICAL, HONEST, PASSIONATE information security professionals for IT Security professionals. Our mission is to share cutting edge knowledge, real world stories and independent lab reviews on the best ideas, products and services in the information technology industry. - See more at: http://www.cyberdefensemagazine.com/contact-us/about-us/#sthash.1y7Xr9xm.dpuf
Other creatorsSee project
Languages
-
Inglese
-
Recommendations received
12 people have recommended Pierluigi
Join now to viewMore activity by Pierluigi
-
🚨As I’ve said repeatedly, China’s cyber program presents the most serious & immediate threat to US national security. The PRC’s objective is…
🚨As I’ve said repeatedly, China’s cyber program presents the most serious & immediate threat to US national security. The PRC’s objective is…
Liked by Pierluigi Paganini
-
"NCIA is pleased to team up with SHAPE and Palantir Technologies to deliver MSS NATO to the Warfighter, providing customized state-of-the-art AI…
"NCIA is pleased to team up with SHAPE and Palantir Technologies to deliver MSS NATO to the Warfighter, providing customized state-of-the-art AI…
Liked by Pierluigi Paganini
-
Momento Relax! 1) Chiedi a chatGPT di creare una Action Figure partendo da una tua foto e usando le informazioni che sa di te. 2) Chiedi a chatGPT…
Momento Relax! 1) Chiedi a chatGPT di creare una Action Figure partendo da una tua foto e usando le informazioni che sa di te. 2) Chiedi a chatGPT…
Liked by Pierluigi Paganini
-
#Tycoon2FA #phishing kit rolled out significant updates https://lnkd.in/ePKR5mQP #securityaffairs #hacking
#Tycoon2FA #phishing kit rolled out significant updates https://lnkd.in/ePKR5mQP #securityaffairs #hacking
Shared by Pierluigi Paganini
-
#South #African telecom provider Cell C disclosed a data breach following a cyberattack https://lnkd.in/d-KHDhMR #securityaffairs #hacking
#South #African telecom provider Cell C disclosed a data breach following a cyberattack https://lnkd.in/d-KHDhMR #securityaffairs #hacking
Shared by Pierluigi Paganini
-
🚨 Routers are now the riskiest devices in enterprise networks According to Forescout Technologies Inc.'s just-released "Riskiest Connected Devices…
🚨 Routers are now the riskiest devices in enterprise networks According to Forescout Technologies Inc.'s just-released "Riskiest Connected Devices…
Liked by Pierluigi Paganini
-
SECURITY AFFAIRS #MALWARE #NEWSLETTER ROUND 41 https://lnkd.in/d5iKEKgs #securityaffairs #hacking
SECURITY AFFAIRS #MALWARE #NEWSLETTER ROUND 41 https://lnkd.in/d5iKEKgs #securityaffairs #hacking
Liked by Pierluigi Paganini
-
Buona domenica! Caminetto acceso, poltrona, tè caldo, nuovo articolo su garantepiracy dedicato al recentissimo data breach subito da un importante…
Buona domenica! Caminetto acceso, poltrona, tè caldo, nuovo articolo su garantepiracy dedicato al recentissimo data breach subito da un importante…
Liked by Pierluigi Paganini
-
I am this old. I had almost the exact same setup. Did anyone else?
I am this old. I had almost the exact same setup. Did anyone else?
Liked by Pierluigi Paganini
-
Perchè certe notizie non sfuggano alla nostra attenzione. In CINA da Settembre sarà obbligatorio insegnare per almeno 8 ore settimanali “Intelligenza…
Perchè certe notizie non sfuggano alla nostra attenzione. In CINA da Settembre sarà obbligatorio insegnare per almeno 8 ore settimanali “Intelligenza…
Liked by Pierluigi Paganini
-
SECURITY AFFAIRS #MALWARE #NEWSLETTER ROUND 41 https://lnkd.in/d5iKEKgs #securityaffairs #hacking
SECURITY AFFAIRS #MALWARE #NEWSLETTER ROUND 41 https://lnkd.in/d5iKEKgs #securityaffairs #hacking
Shared by Pierluigi Paganini
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Pierluigi Paganini
2 others named Pierluigi Paganini are on LinkedIn
See others named Pierluigi Paganini