Breaking News

Pierluigi Paganini August 06, 2016
Cyberwar – The cyberspace is already a dangerous battlefield

The number of high-profile hacks demonstrates that a silent cyberwar is already ongoing among countries in the cyberspace. The recent hacks of the Democratic National Committee and presidential candidate Hillary Clinton’s campaign and the alleged infections spotted by the Russian FSB inside government networks demonstrate the intense activity in the cyberspace. It is a virtual […]

Pierluigi Paganini August 06, 2016
Kasidet PoS malware bypasses Account Control posing as Microsoft App

Experts from Dr Web discovered a new PoS malware dubbed Kasidet that can bypass User Account Control (UAC) by posing as a legitimate Microsoft application. A new strain of PoS malware is in the wild, experts from security firm Doctor Web  named it Trojan.Kasidet.1 and it is able to bypass defense mechanism such as the Microsoft […]

Pierluigi Paganini August 06, 2016
FireEye Report – 33 percent of ICS Flaws had no vendor fixes when reported

FireEye documented more than 1,500 vulnerabilities affecting ICS disclosed in the past 15 years, and some of them are still present. Security of critical infrastructure is a pillar of the cyber strategy of any government, both the NIS directive and Warsaw NATO summit stressed the importance of a proper security posture to protect our systems from cyber […]

Pierluigi Paganini August 05, 2016
How to withdraw up to $50,000 in cash from an ATM by using data stolen from EMV cards

Researchers have demonstrated how crooks can make ATMs spit out thousands of dollars in cash in just a few minutes by using data stolen from EMV cards. When the EMV (Europay, MasterCard, and Visa) was introduced, the vast majority of security experts believed solved the problems caused by easy to clone magnetic stripe cards. EMV chip-equipped […]

Pierluigi Paganini August 05, 2016
Apple will pay up to $200,000 in Bug Bounty Program

Apple has chosen the Black Hat 2016 security conference to announce the launch of its bug bounty program, hackers can earn up to $200,000 for a flaw. Great news for bug hunters, finally Apple announced that it will pay hackers that will find bugs in its products. Apple is the last IT giant to launch […]

Pierluigi Paganini August 05, 2016
Analyzing CIA Director BRENNAN’s talk at Council on Foreign Relations (CFR)

We bring to the attention of the Security Affairs readers the interesting speech and interview dated 29/06/2016 of CIA Director John O. BRENNAN at the CFR We bring to the attention of the Security Affairs readers the interesting speech and interview dated 29/06/2016 of CIA Director John O. BRENNAN at the Council on Foreign Relations […]

Pierluigi Paganini August 05, 2016
Hacker Interviews – Gh0s7

Gh0s7 is a hacker that has participated in several hacking campaigns which is known for its efforts against the ISIS propaganda online. Enjoy the interview! Did you participate in several hacking campaigns? could you tell me more about you? I was the founder of Ghost Squad Hackers , when i started my hacktivism and (if it […]

Pierluigi Paganini August 05, 2016
Top Security Priorities of the Internet of Things

The rise of the Internet of Things is being heralded by many as the beginning of a new Industrial Revolution. Technology firms are now linking objects ranging from household appliances to industrial machinery to the internet. With telecommunications firms on board, manufacturers are coming up with new, innovative uses for everyday objects. Yet linking these […]

Pierluigi Paganini August 04, 2016
#BHUSA2016 – Researcher explained how to hack any PC with a found USB drive

At Black Hat USA, the security researcher Elie Bursztein demonstrated the dangers of found USB drive and how to create a realistic one. Giving a look at the titles of the presentations in the agenda of the Black Hat USA Conference 2016 I noticed an interesting topic proofed by the security expert Elie Bursztein, the […]

Pierluigi Paganini August 04, 2016
Cisco Small Business Routers plagued by several critical flaws

Security experts have uncovered several critical flaws in Cisco Small Business Routers that in some cases could result in the take over of the device Security experts Adam Zielinski and Harri Kuosmanen reported to CISCO several critical and high severity flaws in the CISCO Small Business Routers. According to CISCO, the CVE-2015-6397 flaw affects RV series […]