Secure Network

Last updated
Secure Network S.r.l.
Company type Limited company
Industry Information Security
Founded2004
Founder Alvise Biffi, Stefano Zanero
Headquarters Milano, Italy
Website www.securenetwork.it

Secure Network is a small offensive security and security research company focusing on Information Security based in Milano, Italy. Besides having notability in Italy, [1] it received international exposure [2] [3] [4] with a research project on Bluetooth security (co-sponsored by F-Secure) codenamed BlueBag, which has been also selected for the Black Hat Briefings conference 2006 in Las Vegas. [5]

In 2009, it also organized SEaCURE.IT, [6] the first international technical security conference ever held in Italy. [7] [8] [9] [10]

Secure Network also offers internet security compliance consulting to private companies. [11]

Related Research Articles

Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks (PANs). In the most widely used mode, transmission power is limited to 2.5 milliwatts, giving it a very short range of up to 10 metres (33 ft). It employs UHF radio waves in the ISM bands, from 2.402 GHz to 2.48 GHz. It is mainly used as an alternative to wired connections to exchange files between nearby portable devices and connect cell phones and music players with wireless headphones.

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">Wi-Fi</span> Wireless local area network

Wi-Fi is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves. These are the most widely used computer networks, used globally in home and small office networks to link devices and to provide Internet access with wireless routers and wireless access points in public places such as coffee shops, hotels, libraries, and airports to provide visitors.

<span class="mw-page-title-main">Home automation</span> Building automation for a home

Home automation or domotics is building automation for a home. A home automation system will monitor and/or control home attributes such as lighting, climate, entertainment systems, and appliances. It may also include home security such as access control and alarm systems.

<span class="mw-page-title-main">Near-field communication</span> Radio communication established between devices by bringing them into proximity

Near-field communication (NFC) is a set of communication protocols that enables communication between two electronic devices over a distance of 4 centimetres (1.6 in) or less. NFC offers a low-speed connection through a simple setup that can be used for the bootstrapping of capable wireless connections. Like other proximity card technologies, NFC is based on inductive coupling between two electromagnetic coils present on a NFC-enabled device such as a smartphone. NFC communicating in one or both directions uses a frequency of 13.56 MHz in the globally available unlicensed radio frequency ISM band, compliant with the ISO/IEC 18000-3 air interface standard at data rates ranging from 106 to 848 kbit/s.

Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP).

<span class="mw-page-title-main">Nordic Semiconductor</span> Norwegian multinational semiconductors manufacturer

Nordic Semiconductor ASA was founded in 1983 and is a Norwegian fabless technology company with its headquarters in Trondheim, Norway. The company specializes in designing ultra-low-power wireless communication semiconductors and supporting software for engineers developing and manufacturing Internet of Things (IoT) products.

Hacktivismo is an offshoot of Cult of the Dead Cow (cDc), whose beliefs include access to information as a basic human right. It was founded in 1999.

<span class="mw-page-title-main">Check Point</span> Israeli security company

Check Point is an American-Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management.

<span class="mw-page-title-main">Wireless security</span> Aspect of wireless networks

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The term may also refer to the protection of the wireless network itself from adversaries seeking to damage the confidentiality, integrity, or availability of the network. The most common type is Wi-Fi security, which includes Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802.11 standard from 1997. It is a notoriously weak security standard: the password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP was superseded in 2003 by WPA, a quick alternative at the time to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP. Enterprises often enforce security using a certificate-based system to authenticate the connecting device, following the standard 802.11X.

A Bluetooth stack is software that is an implementation of the Bluetooth protocol stack.

Piggybacking on Internet access is the practice of establishing a wireless Internet connection by using another subscriber's wireless Internet access service without the subscriber's explicit permission or knowledge. It is a legally and ethically controversial practice, with laws that vary by jurisdiction around the world. While completely outlawed or regulated in some places, it is permitted in others.

Italian intelligence agencies are the intelligence agencies of Italy. Currently, the Italian intelligence agencies are the Agenzia Informazioni e Sicurezza Esterna (AISE), focusing on foreign intelligence, and the Agenzia Informazioni e Sicurezza Interna (AISI), focusing on internal security. They form part of the Department of Information for Security, which in turn is part of the Presidency of the Council of Ministers. The agencies have been reorganized multiple times since the birth of the Italian Republic in 1946 to attempt to increase effectiveness.

Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern.

The 1100-series IP phones are 6 different desktop IP clients manufactured by Avaya for Unified communications which can operate on the SIP or UNIStim protocols. The SIP Firmware supports presence selection and notification along with secure instant messaging.

<span class="mw-page-title-main">Cloud Security Alliance</span>

Cloud Security Alliance (CSA) is a not-for-profit organization with the mission to “promote the use of best practices for providing security assurance within cloud computing, and to provide education on the uses of cloud computing to help secure all other forms of computing.”

Bluetooth Mesh is a computer mesh networking standard based on Bluetooth Low Energy that allows for many-to-many communication over Bluetooth radio. The Bluetooth Mesh specifications were defined in the Mesh Profile and Mesh Model specifications by the Bluetooth Special Interest Group. Bluetooth Mesh was conceived in 2014 and adopted on July 13, 2017.

BlueBorne is a type of security vulnerability with Bluetooth implementations in Android, iOS, Linux and Windows. It affects many electronic devices such as laptops, smart cars, smartphones and wearable gadgets. One example is CVE-2017-14315. The vulnerabilities were first reported by Armis, the asset intelligence cybersecurity company, on 12 September 2017. According to Armis, "The BlueBorne attack vector can potentially affect all devices with Bluetooth capabilities, estimated at over 8.2 billion devices today [2017]."

<span class="mw-page-title-main">Ang Cui</span> American computer scientist

Ang Cui is an American cybersecurity researcher and entrepreneur. He is the founder and CEO of Red Balloon Security in New York City, a cybersecurity firm that develops new technologies to defend embedded systems against exploitation.

The zero trust security model, also known as zero trust architecture (ZTA), and sometimes known as perimeterless security, describes an approach to the strategy, design and implementation of IT systems. The main concept behind the zero trust security model is "never trust, always verify", which means that users and devices should not be trusted by default, even if they are connected to a permissioned network such as a corporate LAN and even if they were previously verified.

References

  1. "Web Thematic channels Ict Internet Insights 800 MILLION DIGITAL LOCKS 1390 4 | Euro Group".
  2. McMillan, Robert (22 June 2006). "Case Study: BlueBag finds Bluetooth flaws". howto.techworld.com. Archived from the original on 6 July 2014.
  3. "'BlueBag' PC sniffs out Bluetooth flaws". 7 June 2006.
  4. "Say Hello to the Blue Bag Bluetooth Attack Device - Forums". Archived from the original on 2011-07-18. Retrieved 2009-11-08.
  5. "Blackhat 2006: 'Bluebag' detects Bluetooth devices within 200 meters". 9 August 2006.
  6. "SEaCURE.IT". Archived from the original on 22 August 2010. Retrieved 2 August 2021.
  7. "SEaCURE.IT : I GURU DELLA SICUREZZA a SMAU 2009 :: Smau :: Business technology: Innovazione per l'impresa e la P.A." Archived from the original on 2010-02-13. Retrieved 2009-11-08.
  8. "SEaCURE.IT, focus sulla sicurezza a Smau 2009".
  9. "Whoops!".
  10. "Data Manager Online". Archived from the original on 2011-07-22. Retrieved 2009-11-08.
  11. "Governance, Risk and Compliance management – Secure Networks" . Retrieved 2021-10-02.