Breaking News

Pierluigi Paganini July 08, 2017
GMR-2 issues allow satellite phone communications decryption in near real-time

Researchers have exploited vulnerabilities in the implementation of the GMR-2 cipher decrypt satellite phone communications in fractions of a second. Two Chinese security researchers have exploited vulnerabilities in the implementation of the GMR-2 standard that could be exploited to decrypt satellite phone communications in fractions of a second. The GMR-2 is a stream cipher with 64-bit key-length […]

Pierluigi Paganini July 08, 2017
UK Police: Accessing the Darkweb could be a sign of terrorism

In a leaflet distributed by the UK authorities, the police tell citizens to be vigilant on anyone using the darkweb. The widespread of terrorism in Europe has been very severe recently. As a way of effectively dealing with In a wake of recent terror attacks, London authorities are conducting various initiatives to fight the threat. […]

Pierluigi Paganini July 08, 2017
Hard Rock and Loews hotel chains notified guests of security breaches

Hard Rock and Loews hotel chains notified guests of security breaches, the incidents are linked to hack of the SynXis platform provided by the Sabre firm. It has happened again, the Hard Rock Hotels and Casinos franchise is alerting guests about a possible data breach. Customers have to monitor their bank account for suspicious activity […]

Pierluigi Paganini July 08, 2017
Mondelez International and Reckitt warn of economic impact of cyber attack on sales

Cyber attacks could have a significant impact on businesses, Mondelez International and Reckitt warn of NotPetya effect on the sales. Cyber attacks could have a significant impact on businesses, and two of the world’s largest consumer goods companies confirmed it. On Thursday the companies Mondelez and Reckitt Benckiser warned of the impact of the NotPetya […]

Pierluigi Paganini July 07, 2017
The author of the original Petya ransomware released the master key

The author of the original variant of the Petya ransomware has made the master key available online, all the victims can decrypt their files for free. Janus, the author of the original variant of Petya ransomware (that isn’t the NotPetya variant used in the recent massive attack) has made the master key available online. All the victims of the […]

Pierluigi Paganini July 07, 2017
BroadPwn potentially expose to hack millions of Android devices using Broadcom Wi-Fi Chip

Google warned of a serious flaw dubbed BroadPwn in some Broadcom Wi-Fi chipsets that potentially impacts millions of Android devices. Google published the monthly security update for Android devices, it warned of a serious flaw, dubbed BroadPWN, in some Broadcom Wi-Fi chipsets that potentially impacts millions of Android devices, as well as some iPhone models. BroadPwn is […]

Pierluigi Paganini July 07, 2017
Tips to Stay Secure on Summer Vacations

In the excitement of summer vacations, most of us forget to equip ourselves with the privacy tools and needed security measures. Yet, such flawed data security could ruin your vacations as the cyber goons always remain on work. Therefore, here we have listed some essential steps that are must to secure your sensitive information you […]

Pierluigi Paganini July 07, 2017
CopyCat Android malware infected 14 Million devices and rooted 8 Million

Researchers at Check Point spotted a new family of Android malware dubbed CopyCat that infected 14 million devices and rooted 8 million of them. Researchers at Check Point’s Mobile Research Team have spotted a new family of Android malware that infected 14 million devices and rooted 8 million of them. According to the expert, the […]

Pierluigi Paganini July 06, 2017
Wikileaks: BothanSpy and Gyrfalcon CIA Implants steal SSH Credentials from Windows and Linux OSs

WikiLeaks leaked documents detailing BothanSpy and Gyrfalcon CIA implants designed to steal SSH credentials from Windows and Linux OSs. WikiLeaks has published a new batch of documents from the Vault7 dump detailing two new CIA implants alleged used by the agency to intercept and exfiltrate SSH (Secure Shell) credentials from both Windows and Linux operating systems […]

Pierluigi Paganini July 06, 2017
Perl devs fix an important flaw in DBD—MySQL that affects encryption between client and server

Perl development team solved a flaw in DBD—MySQL in some configurations that wasn’t enforcing encryption allowing an attacker to power MiTM attacks. The security researcher Pali Rohár reported an important flaw in DBD—MySQL, tracked as CVE-2017-10789, that affects only encryption between client and server. According to the expert, the issue in some configurations wasn’t enforcing encryption allowing an attacker to […]