Breaking News

Pierluigi Paganini April 05, 2015
Google Internet Authority G2 has become untrusted due to an expired certificate

Gmail and Google Apps have noticed on Saturday that the Google Internet Authority G2 has become untrusted due to an expired digital certificate. On Saturday April 4, the Google Internet Certificate Authority G2 has become untrusted due to an expired digital certificate in the chain of trust. The Google Internet Authority G2 is an essential component of the Google PKI […]

Pierluigi Paganini April 04, 2015
Malware infections on Android devices have been halved in 2014

Android presented its Security State of the Union 2014 and confirmed that the number of infections have been halved in a year due to Google’s improvements. Google confirmed that malware infections have been halved in a year due to  security upgrades for the Android mobile platform. Android security engineer Adrian Ludwig explained in a blog post that […]

Pierluigi Paganini April 04, 2015
Abusing block chain to share illegal data, including pedo material

The international criminal police organisation Interpol and private researchers discovered a severe flaw in block chain used by virtual currencies. INTERPOL cyber threat researchers, including members of the Kaspersky Lab, have identified a serious vulnerability in the virtual currencies schema. The flaw resides in the ‘block chain’ related to virtual transactions and it could be exploited to […]

Pierluigi Paganini April 04, 2015
Bugs in Tor exploited to run DoS against black markets

A severe vulnerability  in Tor network was exploited by attackers to run denial of service attacks against two underground black markets. An operator of an underground black market hosted on the Tor network revealed that hit site suffered a DoS attack that exploited a flaw in Tor architecture. The event is not isolated, a similar […]

Pierluigi Paganini April 03, 2015
TrueCrypt doesn’t include a backdoor according to a security audit

The security audit of the popular encryption software TrueCrypt reveals the absence of the backdoor and other significant flaws exploitable by the NSA. The news of the day is the conclusion of the security audit of the popular encryption tool TrueCrypt that confirmed the absence of any backdoor neither critical design vulnerabilities inside the source code. TrueCrypt is a […]

Pierluigi Paganini April 03, 2015
Eastern European Cyber-gang manages a new Dyre Wolf campaign

Security experts from IBM discovered a very sophisticated malware campaign based on the Dyre Trojan to hack Corporate Bank Accounts. IBM has uncovered an important cyber criminal operation dubbed The Dyre Wolf due to the name of the popular Dyre malware used crooks. The Dyre malware was discovered in the wild by several security firms, […]

Pierluigi Paganini April 03, 2015
Google goes on the Offensive versus Ad Injectors

Google has announced serious actions to prevent ad injectors that compromise the integrity of users’ browsing experience across the globe. Google has declared “war” on programs that compromise the integrity of users’ browsing experience across the globe.  In a recent blog post featured on Google’s Online Security Blog, Google has released information surrounding research that […]

Pierluigi Paganini April 03, 2015
TrendMicro spotted a 64-Bit variant of NewPosThings PoS malware

Researchers at Trend Micro spotted a 64-bit variant of NewPosThings PoS malware designed to steal payment card and other sensitive data. Researchers at Trend Micro have identified a new strain of the NewPosThings point-of-sale (PoS) malware. The new variant of NewPosThings malware is a 64-bit version of NewPosThings, a point-of-sale (PoS) malware discovered by experts at Arbor Networks in […]

Pierluigi Paganini April 02, 2015
Obama signed an executive order as deterrent against hacking

A new executive order signed by the US President Obama imposes sanctions against every entities that is threatening US assets, even overseas hackers The President of United States, Barack Obama has signed an executive order that uses economic restrictions to “control” anyone that is trying to attack any American interests. But what this exactly means? […]

Pierluigi Paganini April 02, 2015
Fake Pirate Bay website exploited to serve banking Trojan to WordPress users

Security experts at MalwareBytes discovered that unaware WordPress users are infected with a banking trojan served by a fake Pirate Bay website. Some WordPress websites are being used to redirect users to a fake Pirate Bay that is being used to make the reader to push malware, says Malwarebytes. WordPress websites were injected with the same iframe during the […]