Pierluigi Paganini

Pierluigi Paganini

Naples, Campania, Italy
122K followers 500+ connections

About

Cyber Security Expert, Cybercrime Analyst, writer, author

Specialties: Security…

Articles by Pierluigi

See all articles

Activity

Join now to see all activity

Experience

  • Università Telematica Pegaso Graphic
  • -

    Milano

  • -

    Roma

  • -

  • -

    Roma, Lazio, Italia

  • -

    Firenze

  • -

  • -

    Italia

  • -

  • -

    US

  • -

    Roma

  • -

    EUROPE

  • -

    Milano, Roma, Napoli, Torino, Benevento

  • -

    Rome Area, Italy

  • -

    Italia

  • -

    Roma

  • -

    EU

  • -

    Roma

  • -

    Rome

  • -

  • -

    Università Tor Vergata Roma

  • -

    Roma

  • -

  • -

  • -

  • -

  • -

Education

Licenses & Certifications

  • Certified Ethical Hacker

    EC Coucil London

    Credential ID ID ECC913557

Publications

  • Malware... It’s all about you...

    The Malta Independent (Newspaper)

    The military strategist Carl von Clausewitz stated:
    “All war presupposes human weakness and seeks to exploit it.”

    Malicious software (malware) is software that is explicitly designed to exploit vulnerabilities in computing devices and human users to the malicious advantage of the malware author or malware user. Malware comes in many forms, including computer viruses, worms, trojan, spyware, ransom-ware, ad-ware, root kits, and so on.

    In 2008, the number of devices connected to…

    The military strategist Carl von Clausewitz stated:
    “All war presupposes human weakness and seeks to exploit it.”

    Malicious software (malware) is software that is explicitly designed to exploit vulnerabilities in computing devices and human users to the malicious advantage of the malware author or malware user. Malware comes in many forms, including computer viruses, worms, trojan, spyware, ransom-ware, ad-ware, root kits, and so on.

    In 2008, the number of devices connected to the Internet exceeded the number of people on earth: Smartphones, tablets, industrial control systems, smart grids, medical devices, environmental sensors (vibration, temperature, light, video, audio) and so on. According to CISCO, by 2020 that number will grow to 50 billion devices. In the EU vision of an “ambient intelligence” world, devices will work in concert to support people carrying out their everyday life activities, tasks, and rituals, in an easy natural way, using information and intelligence that is hidden within the network connecting these devices. As these devices shrink, and become more connected and integrated into our environment, the technology disappears into our surroundings until only the user interface remains perceivable by users. If this trend continues, billions of these invisible devices will be vulnerable to attacks and will be trivially subverted covertly against us.

    One can try arguing that we have lived with computer vulnerabilities without a major crisis in the past, so why start worrying now? The problem is that the value in attacking these devices is growing exponentially, while our dependence on them increases. As more personal and business transactions are performed online, there is a clearer “return on investment” for attacking these systems.

    ....

    Other authors
    See publication
  • Are your business operations secure?

    The Malta Independent (Newspaper)

    Today, the chief executive officers (CEOs) of many businesses are becoming aware of the need to ensure their IT systems are secured to protect their organisation, their customers, and their stakeholders. According to Brian Snow, former technical director of the US NSA’s Information Assurance Directorate:

    “Data breaches and financial losses are now hurting every segment of the community, it’s a wake-up call. They are driving the community to become acutely aware of the (security)…

    Today, the chief executive officers (CEOs) of many businesses are becoming aware of the need to ensure their IT systems are secured to protect their organisation, their customers, and their stakeholders. According to Brian Snow, former technical director of the US NSA’s Information Assurance Directorate:

    “Data breaches and financial losses are now hurting every segment of the community, it’s a wake-up call. They are driving the community to become acutely aware of the (security) weaknesses in current products and systems, and better yet, it forces an increasing awareness of the real need to fix things!”

    In an effort to incentivise change in today’s business practices, proposed amendments to the EU Data Protection Law state:

    “Companies found to have mishandled any personal data they hold – be it of their customers, suppliers or their own employees – will face “penalties of up to €1 million or up to two per cent of the global annual turnover of a company.”

    The ultimate responsibility in the case of a data breach rests with the CEO. The role of the CEO is to ensure that cyber-security issues are adequately addressed within their organisation by ensuring adequate commitment of time and finances to support the process.

    ...

    Other authors
    See publication
  • The ‘cyber war’ era began long ago

    The Malta Independent (Newspaper)

    US military strategist John Boyd states:

    “War comprises acts of physical, biological, psychological, social, cultural and other destruction at all levels, for example, intrapsychic, interpersonal, intergroup, interorganisational, and international.”

    Cyber warfare is combat in cyberspace and includes computers, the Internet and the “sphere of human thought” (Noosphere, Social Media). Cyber operations can be Kinetic (physical destruction) and Non-Kinetic (attacks against computers…

    US military strategist John Boyd states:

    “War comprises acts of physical, biological, psychological, social, cultural and other destruction at all levels, for example, intrapsychic, interpersonal, intergroup, interorganisational, and international.”

    Cyber warfare is combat in cyberspace and includes computers, the Internet and the “sphere of human thought” (Noosphere, Social Media). Cyber operations can be Kinetic (physical destruction) and Non-Kinetic (attacks against computers, intellectual property, financial systems, and the realm of ideas, opinions, beliefs and feelings). The boundaries between conventional operations (munitions, psychological) and cyber-operations is blurring, as cyber attacks begin to be used as a force multiplier in conventional operations.

    Cyber warfare is generally different from cybercrime, with cybercrime seen as financially motivated, and cyber warfare as politically motivated. Cyber attacks that result in physical destruction of critical infrastructure or large loss of life are considered acts of war/terrorism. Cyber attacks can originate or be triggered from anywhere. Cyber warfare can be conducted by traditional nation-states and other actors. Paradoxically, cyber warfare can, and already does, take place during “peacetime” periods when there is no conventional conflict occurring.

    ...

    Other authors
    See publication
  • Serious safety and security problems in automotive, aviation, aerospace and other cyber-physical systems (Part 2 of 2)

    The Malta Independent (Newspaper)

    Right now, the expert consensus is that civilian cyber-physical systems deployed today by many industries are frequently engineered using KNOWN UNSAFE practices. In this week’s article we look at the complex trends, dispositions, and behaviours, of organisations in the cyber-physical systems community today that limit the adoption of safety and security best practices. We will also explore the ICT Gozo Malta Project’s activities to overcome these barriers.

    Other authors
    See publication
  • Serious safety and security problems in automotive, aviation, aerospace and other cyber-physical systems

    The Malta Independent (Newspaper)

    Convergence in world leading research in Europe to tackle these problems (Part 1 of 2)

    Other authors
    See publication
  • Serious safety and security problems in automotive, aviation, aerospace and other cyber-physical systems

    The Malta Independent (Newspaper)

    Convergence in world leading research in Europe to tackle these problems (Part 1 of 2)

    Other authors
    See publication
  • International Collaboration to Bring You Authoritative Insider Perspectives on the Global Cyber Safety and Security Status (Part 4 of 4)

    The Malta Independent (Newspaper)

    Cyber security, civil liberties, our common welfare and the stability of Nations. How bad is the cyber security situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do to improve my situation and protect those I care about? This is the fourth article in this series that quotes cyber security insiders to progressively answer these important questions.

    This week we talk about that 8000 pound elephant sitting in…

    Cyber security, civil liberties, our common welfare and the stability of Nations. How bad is the cyber security situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do to improve my situation and protect those I care about? This is the fourth article in this series that quotes cyber security insiders to progressively answer these important questions.

    This week we talk about that 8000 pound elephant sitting in the room; we will recall how systematically poor governance decisions around the world has undermined the community and resulted in severe risks to National, Regional and Global stability.

    Between 1970 and 2000, individuals and organizations concerned with protecting their personal privacy and corporate secrets were engaged in heated discussions with governments around the world. They wanted the response-ability to employ high assurance security techniques and technologies to safeguard their legitimate interests, and the legitimate interests of their stakeholders. i.e. The ability to defend their domain. During that period of time, policies and legislation discouraged or outright prevented the private sector from building genuinely secure computing systems for the civilian community. The Australian Government – Department of Defence – Defense Signals Directorate website ( http://dsd.gov.au ) openly promotes their mission statement as: “Reveal Their Secrets – Protect our Own”. Unfortunately in the past, in practice, most Governments around the world defined “Their Secrets” as the private or sensitive data of any person or organisation not part of their own Government. To ensure easy *covert* access to historically unprecedented amounts of sensitive data Governments around the world systematically undermined and prohibited effective civilian cyber security. ...

    Other authors
    See publication
  • International collaboration to bring you insider perspectives on global cyber safety and security status (Part 3 of 4)

    The Malta Independent (Newspaper)

    Data-breaches, intellectual property loss and your money… We have all heard the headlines about the social and economic implications of cybercrime, but how bad is the situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do to improve my situation and protect those I care about?

    his week we look at the perverse economic incentives driving cybercrime, how we got ourselves into this cyber mess, and explore the concept…

    Data-breaches, intellectual property loss and your money… We have all heard the headlines about the social and economic implications of cybercrime, but how bad is the situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do to improve my situation and protect those I care about?

    his week we look at the perverse economic incentives driving cybercrime, how we got ourselves into this cyber mess, and explore the concept of due-care.

    With our sincerest apologies to Jessie J and her song “Price Tag”, in the cyber espionage and freelancing underground cybercrime communities: “It’s all about the money, money, money. We want your money, money, money. We just want to hack your computer. Forget about your welfare. It’s about your (ha) Cha-Ching Cha-Ching. It’s about your (yeah) Ba-Bling Ba-Bling. Can you feel that (yeah). We’ll pay them with your credit card tonight…”


    Unfortunately, cyber espionage and cyber crime are profitable industries that are immune to the current economic crisis and their own moral crisis. ....

    Other authors
    See publication
  • Insider perspectives on the status of global cyber safety and security status (Part 2 of 4)

    The Malta Independent (Newspaper)

    Critical infrastructure protection, StuxNet, exploding computers, blackouts, collapsing banking systems, and cyber war!! None of us have escaped the headlines warning of impending cyber doom, but this is just sensationalism, right? How bad is the situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do to improve my situation and protect those I care about?

    Weak cyber security is one of the most serious economic and…

    Critical infrastructure protection, StuxNet, exploding computers, blackouts, collapsing banking systems, and cyber war!! None of us have escaped the headlines warning of impending cyber doom, but this is just sensationalism, right? How bad is the situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do to improve my situation and protect those I care about?

    Weak cyber security is one of the most serious economic and (inter)national security challenges we face today. In fact, it is argued by many world-leading experts that today’s cyber security risks place the stability of entire nations at risk. The US government position is: “It’s now clear this cyber threat is one of the most serious economic and national security challenges we face as a nation. It’s also clear that we’re not as prepared as we should be, as a government, or as a country.”

    The UK government position, articulated in a rare public statement by Ian Lobban, Director General of the UK Government Communications Headquarters (GCHQ), is: “The UK’s critical infrastructure faces a ‘real and credible’ threat of cyber attack. It goes to the heart of our economic well-being and national interest.”

    To quote Brian Snow, former Technical Director of the US NSA’s Information Assurance Directorate: “No (person or) organisation is immune and it is no longer credible to say: Not my problem!”

    Other authors
    See publication
  • International collaboration brings you insider perspectives on global cyber safety and security status (Part 1 of 4)

    The Malta Independent (Newspaper)

    Today there is a lot of interest in “Cyber warfare” and “Cyber threats”. Week after week we are bombarded with news about massive security failures, one after the other. For example, according to the Utah Department of Health, the sensitive personal information of more than 780,000 people was stolen from a government health department computer in Utah, USA in March 2012. These ongoing reports leave many of us feeling unsure on what can be done. Is this just sensationalism? How bad is the…

    Today there is a lot of interest in “Cyber warfare” and “Cyber threats”. Week after week we are bombarded with news about massive security failures, one after the other. For example, according to the Utah Department of Health, the sensitive personal information of more than 780,000 people was stolen from a government health department computer in Utah, USA in March 2012. These ongoing reports leave many of us feeling unsure on what can be done. Is this just sensationalism? How bad is the situation really? If we have a serious security problem, how do we get ourselves out of this mess? In particular, what can I do to improve my situation and protect those I care about?

    Each week, this easy to understand Cyber Security Awareness Series will quote cyber security insiders to answer these important questions. This four-part series is another example of international collaboration created by the ICT Gozo Malta Project, this time with experienced international security reporter Pierluigi Paganini, director and Ciso of Bit4ID, Italy. The series contributes to ongoing online publications of extensive cyber awareness resources during 2011 and 2012. These publications from Malta have been blogged and viewed by thousands of people including experts in government and industry around the globe.

    Other authors
    See publication
Join now to see all publications

Projects

  • Cyberwarzone VIP

    The goal of Cyberwarzone is to provide the world a portal with global cyberwar information. The effort in getting this cyberwarfare information is hard. But as the internet is growing we need to get an global cyberwar & cybercrime monitoring system.

    https://www.facebook.com/Cyberwarzone

    Other creators
    See project
  • Founder Security Affairs

    - Present

    A blog that approaches security matters from every perspectives

    See project
  • Cyber Defense Magazine

    -

    Cyber Defense Magazine is by ETHICAL, HONEST, PASSIONATE information security professionals for IT Security professionals. Our mission is to share cutting edge knowledge, real world stories and independent lab reviews on the best ideas, products and services in the information technology industry. - See more at: http://www.cyberdefensemagazine.com/contact-us/about-us/#sthash.1y7Xr9xm.dpuf

    Other creators
    See project

Languages

  • Inglese

    -

Recommendations received

More activity by Pierluigi

View Pierluigi’s full profile

  • See who you know in common
  • Get introduced
  • Contact Pierluigi directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Pierluigi Paganini

Add new skills with these courses