Breaking News

Pierluigi Paganini September 26, 2015
The recent iOS 9.0.1 Update fails to fix the Lock screen Bypass flaw

Apple recently released its first update to the new iOS 9, but experts noticed that it doesn’t fix the lock screen bypass vulnerability. Apple has already released its first update for the release iOS, the version iOS 9.0.1 was issued last week to fix a number of bugs. Last week Jose Rodriguez reported the lock screen bypass vulnerability affecting […]

Pierluigi Paganini September 26, 2015
Card Breach at Hilton Hotel Properties Under Investigation

Hilton Worldwide has issued an official statement informing its customers that the alleged data breach is currently under investigation. As reported by Brian Krebs of Krebs on Security, several sources are claiming that Point-of-Sale (PoS) registers utilized by several businesses operating within a large quantity of Hilton Hotel and franchise properties across the United States. These claims result from the […]

Pierluigi Paganini September 26, 2015
Karma Police, how GCHQ tried to track every visible user on Internet

A new collection of GCHQ’s documents published by The Intercept reveals how the British Agency tried to track Web visits of “every visible user on Internet” A new revelation made by The Intercept confirms that the UK Government Communications Headquarters (GCHQ) has conducted  a massive online surveillance starting from the 2007. The documents accessed by The Intercept detailed an operation […]

Pierluigi Paganini September 25, 2015
GreenDispenser, is the last ATM Malware in the wild

The last threat discovered by security experts at Proofpoint is “GreenDispenser,” a malware that presents many similarities with the Tyupkin malware. The use of malicious code to hack ATM is even more common in the criminal ecosystem, in the past security experts have discovered several strain of malware that was designed with this intent. ATM […]

Pierluigi Paganini September 25, 2015
The US military is still sending un-encrypted emails

The MotherBoard news website recently published an interesting analysis on how the US Military Fails to Protect its Soldiers’ Emails, how is it possible? After the Edward Snowden case blown up in the US Government face, the US decided to create a task force to encrypt all that can, urging the adoption of HTTPS for […]

Pierluigi Paganini September 25, 2015
Lenovo caught with pre-installed tracking application for the third time

Michael Horowitz from Computerworld discovered an application called “Lenovo Customer Feedback Program 64,” which is used to gather customers feedback data. Once, two, three … this is the third time that security experts discover a spyware pre-installed on Lenovo laptops and workstations, and also in this case without the knowledge of its millions of users. […]

Pierluigi Paganini September 25, 2015
Naikon APT Group backed by the Chinese PLA Unit 78020

According to a new report the popular Naikon APT group is actually backed by China’s PLA Unit 78020, a firm traced it through online activity. Ge Xing, also known as “GreenSky27,” is the name of an alleged member of the People’s Liberation Army unit 78020, a group of Chinese state-sponsored hackers. The man was identified […]

Pierluigi Paganini September 24, 2015
XCodeGhost Attack – Is Apple’s Biggest Hack Ever linked to the US Intelligence?

Rumors on the Internet are linking the attack based in XcodeGhost to operations conducted by the CIA (Central Intelligence Agency). A few days ago principal security firm reported the first major cyber attack on the official Apple App Store, thousands of legitimate applications were infected by the XCodeGhost Malware. Apple announced it is cleaning up the […]

Pierluigi Paganini September 24, 2015
Data breaches, stolen data and their sale in the Dark Web

Trend Micro published a report that explains the dynamics triggered by data breaches, following data from the incidents to their offer in the Dark Web. Trend Micro published a report that explains the dynamics triggered by data breaches, following data from the incidents to their offer in the Dark Web. Stolen data is a precious commodity […]

Pierluigi Paganini September 24, 2015
PROTECTING CYBER VENDOR SERVICES WITH CYBERLAW

How does this privacy apply to cybersecurity? The rule of the cyberlaw in the protection of cyber vendor services against the risk of litigation exposure. In most countries and most legal systems, the sanctity of the attorney client relationship is guarded by the courts. Without confidentiality and privacy, the system of law can break down […]