Breaking News

Pierluigi Paganini June 09, 2016
#infosec16 SecurityAffairs awarded as Best European Personal Security Blog

At the fifth annual European Security Blogger Awards at Infosecurity Europe in London SecurityAffairs was awarded as Best European Personal Security Blog Yesterday, during the fifth annual European Security Blogger Awards at Infosecurity Europe in London SecurityAffairs received the award as Best European Personal Security Blog. The awards were assigned through a public vote and votes assigned […]

Pierluigi Paganini June 09, 2016
32 Million Twitter account credentials offered for sale

A hacker is offering for sale more than 32 million Twitter account credentials with plans to sell the account details on the Dark Web. Recent news of massive data breaches suffered by IT giants LinkedIn, MySpace, Tumblr, and VK.com shocked  the security industry. Millions of login credentials are available for sale in the principal black markets, […]

Pierluigi Paganini June 09, 2016
WEEKLY DIGEST – THREAT INTELLIGENCE FEED – MAY 31st  – June 8th  2016

Global Intelligence Insight, working with SecurityAffairs and SecurityMediaPublishing deliver a weekly report on issues in Syria and Iraq as well as extremist related global terrorism. GLOBAL INTELLIGENCE INSIGHT Global Intelligence Insight, working with SecurityAffairs and SecurityMediaPublishing will deliver a weekly report on issues in Syria and Iraq as well as extremist related global terrorism. Data […]

Pierluigi Paganini June 09, 2016
A crafted PDF document can hack your Chrome PDF reader, Update Chrome now!

A security expert discovered that a crafted PDF document that includes an embedded JPG2000 image can trigger a buffer overflow in the Chrome PDF reader. The security expert Aleksandar Nikolic from the Cisco Talos group has discovered an arbitrary code execution vulnerability (CVE-2016-1681) in PDFium, which is the PDF reader component installed by default in Google Chrome […]

Pierluigi Paganini June 08, 2016
Companies Are Stockpiling Bitcoin To Quickly Pay Off Ransomware Criminals

New research conducted by Citrix indicates that some businesses are stockpiling Bitcoins so they can pay cybercriminals fast in case of ransomware attacks. New research conducted by Citrix, a corporate networking company, indicates that some businesses are stockpiling Bitcoins so they can pay cybercriminals fast, if their data is held ransom by malicious software. Ransomware […]

Pierluigi Paganini June 08, 2016
It’s official, ÎŒTorrent Forum Hacked!

The ÎŒTorrent team announced its community ÎŒTorrent forum has been hacked. Hundreds of thousand records belonging its users have been exposed. Are you a Torrent user? Are you one of the users of the popular ΌTorrent Forum? You might be in trouble because the ÎŒTorrent Forum was hacked. ÎŒTorrent is one of the most popular BitTorrent clients, […]

Pierluigi Paganini June 08, 2016
So You want to Capitalize on the IoT Business


The potential of IoT devices connected over cloud networks is breathtaking, opening opportunities that will forever change societal culture. It’s a buzzword that has been around the past decade and has often been portrayed in futuristic visions of a society where man and technology has integrated into one. The potential of IoT devices connected over cloud […]

Pierluigi Paganini June 08, 2016
MI5 collected significantly more data than it can use

A new collection of documents leaked by Edward Snowden and analyzed by The Intercept reveals that MI5 collected significantly more data than it can use. A lot of documents leaked by Edward Snowden revealed that the British Security service MI5 confirmed it was collecting “significantly more than it is able to exploit fully.” The facts date back to 2010, […]

Pierluigi Paganini June 08, 2016
FTC’s chief technologist was victim of Id theft, someone hijacked her phone number

The FTC’s chief technologist gets her mobile phone number hijacked, she shared her experience of a victim of such kind of Id Theft. The incident that I’m going to tell you is worrisome, the US Federal Trade Commission’s chief technologist Lorrie Cranor gets her phone number hijacked. The FTC’s chief technologist was hacked by someone posing […]

Pierluigi Paganini June 07, 2016
Fabrication-time Attacks and the Manchurian Chip

Boffins released a paper describing how computer processors can be programmed to give elevated privileges to hackers and run fabrication-time attacks. A team of researchers from the University of Michigan recently released a paper describing how computer processors can be programmed to give elevated privileges to hackers.  The paper titled, “A2: Analog Malicious Hardware,” describes […]