Breaking News

Pierluigi Paganini December 09, 2015
EU regulation to Impose rules on firms to improve cybersecurity

EU member states and lawmakers have prepared a first draft of the EU regulation in cyber security that will force companies to improve security and report security breaches and cyber incidents. EU member states plan to impose rules in the company to prevent cyber attacks, on Monday they agreed the first draft of the regulation […]

Pierluigi Paganini December 09, 2015
Cadelle and Chafer, Iranian hackers are tracking dissidents and activists

Symantec has uncovered Cadelle and Chafer groups, two Iran-based hacking teams that are tracking dissidents and activists. According to a new report published by Symantec. Iranian hackers have been using malware to track individuals, including Iranian activists and dissidents. The researchers have identified two groups of Iran-based hackers, dubbed Cadelle and Chafer, which were distributing data stealer malware […]

Pierluigi Paganini December 08, 2015
Hashcat, the fastest Password Cracking utility is now Open Source

Hashcat, the popular password recovery tool has been released as open source under the MIT license. You can contribute to it. The popular password cracking tool Hashcat is not an open source software, the announcement was first made on December 4 on Twitter via an MD5 hash that posted  the following message: “hashcat open source” @hashcat […]

Pierluigi Paganini December 08, 2015
Linksys wireless routers are open to cyber attacks

According to an advisory published by the KoreLogic firm the Linksys EA6100-6300 wireless routers are vulnerable to attacks due to flawed CGI scripts. Once again IoT devices are in the headlines, once again SOHO routers are affected by a security vulnerability that opens users to cyber attacks. According to the KoreLogic firm, the flawed devices […]

Pierluigi Paganini December 08, 2015
Nemesis, a bootkit used to steal payment card data

Nemesis is a new strain of malware, very hard to detect and remove, designed to steal payment card data and implementing bootkit functionalities. Experts at FireEye have discovered a new strain of malware designed to steal payment card data. Nothing new, you are probably saying, but this malware dubbed Nemesis is very difficult to detect […]

Pierluigi Paganini December 08, 2015
BackStab Malware steals iOS and BlackBerry Backups

Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile data backups. Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile data backups and transfer it to the C&C server. The malware is not able to […]

Pierluigi Paganini December 07, 2015
Security Affairs newsletter Round 38 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Vtech hacked, data of thousands of kids exposed Russia deploys jamming systems in Syria as tensions rise Turris Omnia Security Project protects home network users Microsoft takes PUPs behind […]

Pierluigi Paganini December 07, 2015
Critical vulnerabilities found in Honeywell Midas Gas Detectors

Another vulnerable IoT device is in the headlines, this time two serious vulnerabilities affect the Honeywell Midas gas detectors. Honeywell has just released firmware updates for its Midas gas detectors to fix two high severity vulnerabilities. The Midas gas detectors are a category of product manufactured by Honeywell to detect toxic, ambient and flammable gasses in the […]

Pierluigi Paganini December 07, 2015
The French Gov wants to Block Tor and Forbid Free Wi-Fi

In response to the recent Paris terror attacks, the French government is proposing to forbid and block the use of the Tor anonymity network. In response to the recent Paris terror attacks, the French government is proposing to forbid and block the use of the Tor anonymity network. According to an internal document from the Ministry of […]

Pierluigi Paganini December 07, 2015
ISIS members have developed a mobile app for its communications

Ghost Security Group has reportedly discovered an Android mobile application used by members of the ISIS organization for secure communications. According to the Christian Science Monitor, the Ghost Security Group has reportedly discovered an Android mobile app used by members of the ISIS organization. The Ghost Security Group is the notorious group of cyber experts in counter-terrorism networks that is […]