Monthly Archives: December 2020

The guy who hacked Twitter: “Kirk” and the human factor

The guy who hacked Twitter: “Kirk” and the human factor

It was a 17-year-old hacker who managed to persuade some Twitter employees that he was a collaborator of the technology department who needed the credentials to log into the customer support portal. Resident of Tampa, Florida, Graham Ivan Clark – known by the pseudonym Kirk – is defined by investigators as a teenager out of the ordinary. The story Having obtained the passwords, “Kirk” was able to enter the Twitter computer system. The intrusion involved access to hundreds of VIP profiles including Barack Obama and Bill Gates, but also Jeff Bezos, Mike Bloomberg, Warren Buffet, Wiz Khalifa, Floyd Mayweather, Elon Musk, and Kanye West. Kirk’s goal was to publish fake […]

Spyware – an almost invisible threat

Spyware – an almost invisible threat

Is your PC or mobile phone not as fast as it used to be? Has your battery started lasting less and less, despite its limited state of deterioration? Have you found that you use more data when surfing the net? If so, you may have been infected with spyware, a rather sneaky malware that lurks in about 90% of PCs without the legitimate users knowing. Spyware: what is it? Spyware is malicious software that infects your computer and spies on you for your personal data. This program can record various personal information, from search and browsing histories to login credentials to credit card information. There are different types of spyware, […]

Olivetti P101: an Italian success

Olivetti P101: an Italian success

The Olivetti “Program 101” computer (P101), presented in 1965, is considered by some to be the first “personal computer” in history, as it had all the main features of large computers of the time, but its size allowed it to be used comfortably on your desk, so much so that it was then called “desktop computer”. The success of the P101 The P101 was a huge commercial success. The P101 wanted to be a consumer product capable of meeting the working needs of the highest possible number of people. Presented at the New York fair in ’65, it had sold over 44,000 copies all over the world in just a […]

How was the Internet born? the World Wide Web Revolution

How was the Internet born? the World Wide Web Revolution

By the end of the 1980s, ARPANET had expanded its nodes overseas and, through the TCP / IP protocols, had led to the creation of a vast “network of networks” of global scale: the Internet. At that point it was necessary to find a way to make the transmission of files and information on the network easy and accessible to all. This problem was solved on August 6, 1991, the day the World Wide Web was born. WWW: How did it all start? His story began a couple of years earlier. In 1989 at CERN in Geneva, the British researcher Tim Berners-Lee was struck by how some Italian colleagues transmitted […]

Business data loss: a nightmare for companies

Business data loss: a nightmare for companies

Business data loss can be detrimental for businesses. Organizations – from small to medium-large – depend on technology when it comes to managing business operations and data storage. Unfortunately, technology is a double-edged sword. If digitization helps business management, a hacker attack can cause a loss of crucial data and information. Heavy financial losses and delays in operations are around the corner. We have covered these issues in our blog about the Campari case. A few numbers How real are these risks? It is estimated that 75% of SMBs have no data recovery plans in the event of a hostile event against their IT infrastructure such as ransomware, for example. […]

Is SOCaaS useful for companies? Google Chronicle as an effective and advantageous SOCaaS service

Is SOCaaS useful for companies? Google Chronicle as an effective and advantageous SOCaaS service

Today, we present a paper that explains the convenience of adopting a SOCaaS service for businesses and organizations. The correct management of IT infrastructures is essential to guarantee any organization’s growth and evolution on the market, as well as obtaining those certifications required to have by law in the field of IT security. Choosing the right technology is one of the most difficult choices faced by the corporate IT manager in the process of building an infrastructure that is secure and resilient to the cyber threats that proliferate on the network. One solution to these problems is to equip your organization with a SOCaaS security service based on cloud technology. […]

When a false flag doesn’t work: Exploring the digital-crime underground at campaign preparation stage

When a false flag doesn’t work: Exploring the digital-crime underground at campaign preparation stage

At the beginning of October 2020 we found copy of a malicious document potentially to be attributed to an APT group known with the name of APT34 / OilRig. The attribution, based on several elements found within the malicious document, was firstly reported by a security researcher through a social network. According the extracted evidences, the author “signed” this malicious document leaving his/her username within the document metadata. This nickname was already widely known within the Cyber Threat Intelligence field because attributed to a member of the already mentioned threat group. Indeed this nickname is Iamfarhadzadeh, linked to Mohammad Farhadzadeh, believed to be a member of the hacking unit identified […]

Cyber threats linked to COVID

Cyber threats linked to COVID

Has the Coronavirus had negative effects on the state of global cybersecurity? Unfortunately, yes. In the past few hours, there has been a series of cyber-attacks against the Italian pharmaceutical company IRBM, which produces the vaccine researched at the University of Oxford. In total, there were at least seven attacks, defined as “very violent” by the CEO Pietro di Lorenzo. The timing suggests a ‘political’ motive to undermine the position of a vaccine that is cheap and easy to transport: the attacks took place hours after the statement that made public the vaccine’s selling price. A worrying trend But it was not an isolated case. In recent days, we have […]

How the Italian Army defends itself from cyber threats: the RSC

How the Italian Army defends itself from cyber threats: the RSC

The Italian Army has recently made the Cyber ​​Security Department (RSC) operational, after establishing it around two years ago. As threats to cyber space increase exponentially, it is absolutely vital in this day and age to have a unit completely dedicated to the control and protection of all military networks and assistance in the various operational theaters at home and abroad. The Department will have mainly defensive tasks, aimed at intercepting cyber-attack attempts and securing all military devices and equipment connected to the network. Cyberwarfare is a pervasive reality within the international playing field and can have serious operational repercussions. A cyberattack directed at army communications systems can have dire […]

Augmented and Virtual Reality: what are the privacy risks?

Augmented and Virtual Reality: what are the privacy risks?

Last month, Nintendo released a new video game in the popular Super Mario Kart saga. The game is part of a new category of Toys-to-life, a video game genre that uses augmented reality to build a kart circuit directly at home. This, however, could be the start of a new privacy problem. In practice, the video camera of the game captures the reality that surrounds the player, so as to create a parallel world within the console with which it is connected. But how does it work? The miracle is allowed thanks to Augmented Reality (AR), a technology that allows us to add information and virtual objects to what surrounds […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close