Breaking News

Pierluigi Paganini October 22, 2015
LowLevel04 ransomware exploits Remote Desktop to spread

Experts at Bleeping Computer blog are reporting a new strain of ransomware dubbed LowLevel04 that is spreading via Remote Desktop and Terminal Service. Security experts at Bleeping Computer blog are reporting a new strain of ransomware dubbed LowLevel04 that is using an unusual infection mechanism, it is being spread via Remote Desktop and Terminal Service. […]

Pierluigi Paganini October 22, 2015
Fitbit trackers can be infected with a malware in just 10 seconds

A security expert conducted a series of tests on the Fitbit trackers discovering how they can be infected with a malware in just 10 seconds. The security researcher Axelle Apvrille revealed that infect Fitbit trackers with a malware is too easy. Axelle Apvrille has managed to infect FitBit Flex fitness tracker and uses them as infection […]

Pierluigi Paganini October 22, 2015
Network Time Protocol flaws can cause chaos on a global scale

Serious flaws in the Network Time Protocol can be exploited to cause severe outages, eavesdrop encrypted communications, bypass authentication processes. Bad news for network administrators, new attacks on Network Time Protocol can defeat HTTPS and create serious problems. The bugs exploited in the attacks was discovered by the experts at the Cisco’s Talos group that has been working […]

Pierluigi Paganini October 21, 2015
Wikileaks releases CIA Director John Brennan emails

Wikileaks has obtained and immediately released the CIA Director John Brennan private emails. It is a first lot, others will be soon published. A few days ago a teen has violated the CIA Director’s private email account and leaked sensitive files including a 47-page  Mr. Brennan’s application for top-secret security clearance. The teenager also disclosed a partial Spreadsheet containing […]

Pierluigi Paganini October 21, 2015
Apple fixes serious flaws in the Productivity Apps

Updates released last week by Apple for Apple Productivity Apps fix a number of flaws that can be exploited for a number of attacks. Apple has recently released Keynote 6.6, Pages 5.6, Numbers 3.6, and iWork for iOS 2.6 to fix multiple flaws in the Productivity Apps, mainly related to input validation issues that caused problems […]

Pierluigi Paganini October 21, 2015
Apple confirms Judge unlock a new iPhone is not possible

Apple told a federal judge that it “would be impossible” to access data on a locked iPhone running one of the newer versions of the iOS operating system. Unlock this iPhone, I need access it for the investigation. It is probably one of the most common requests US law enforcement makes to Apple, but it […]

Pierluigi Paganini October 21, 2015
Businesses Using Millions of insecure SHA-1 Certificates

Experts at Netcraft discovered that nearly a million SSL SHA-1 certificates were signed with the potentially vulnerable SHA-1 hashing algorithm. Businesses Using Millions of Flawed Certificates, the news is shocking and refers the adoption of SHA-1 certificates, despite the algorithm is considered no more secure. Many big businesses, including firms like Deloitte, are still using SHA-1 certificates, […]

Pierluigi Paganini October 21, 2015
Western Digital self-encrypting hard drives are not secure

A trio of researchers has demonstrated that some versions of self-encrypting hard drives manufactured by the Western Digital are affected by security flaws. Some versions of self-encrypting hard drives manufactured by the Western Digital are affected by security flaws that could be exploited with physical access to access protected data, even without knowing the decryption […]

Pierluigi Paganini October 21, 2015
Crooks stole €600,000 in MitM attacks on EMV Cards

A group of French researchers discovered how Fraudsters Stole nearly $680,000 Via MitM Attack on EMV Cards. On October 1st, EMV (Europay, MasterCard, Visa) cards have been introduced in the US to improve the security of payment card holders. EMV cards, also known as chip-and-PIN cards, rely on a cryptographic chip to improve security of banking transaction and avoid […]

Pierluigi Paganini October 20, 2015
eFast browser deletes and replaces your Chrome Browser

Security researchers have documented the existence of a new strain of malware dubbed eFast browser that deletes and replaces the entire Chrome Browser. Security experts from Malwarebytes have analyzed a new strain of  malware that attempts to delete Chrome and replace it with a bogus version that allows attackers to hijack several file associations including HTML, […]