Breaking News

Pierluigi Paganini March 14, 2015
2,400 unsafe applications found in average large enterprise

A recent study published by Veracode on mobile security revealed that 2,400 unsafe applications are in average installed in large enterprise. Mobile devices are becoming an integral part of the enterprise architecture, security depends heavily on the use that is made with mobile devices and from the policies adopted to protect the company from cyber […]

Pierluigi Paganini March 13, 2015
A new Facebook Worm exploits multiple cloud services

Security Experts at Malwarebytes security firm spotted a new  Facebook worm that spreads itself by leveraging multiple cloud services. Social media are a privileged attack vector, recent reports published by the principal security firms confirm that cyber criminal are exploiting these platforms for illegal activities. Last disastrous news for the users of the popular social […]

Pierluigi Paganini March 13, 2015
Google privacy breach caused by a software defect

Expert at Cisco discovered a privacy breach caused by a software problem, which exposed personal information of users that opted for privacy setting. A software problem occurred at Google have exposed personal information of users that registered their website and had chosen to keep their profile private. The flaw affected the whois database that contains contact […]

Pierluigi Paganini March 13, 2015
US Government proposed an amendment to fight botnets

Obama Administration proposes giving courts more power to issue botnet injunctions, a measure necessary to fight the diffusion of malicious infrastructures. The US Government has proposed an amendment that would enable the Department of Justice to seek an injunction to prevent the diffusion of botnets. The Obama’s Administration would add activities like the operation of a […]

Pierluigi Paganini March 13, 2015
Microsoft tries to fix again LNK flaw exploited by Stuxnet

A security bulletin recently released by Microsoft addresses the LNK flaw that was exploited by Stuxnet and that we have wrongly considered patched since 2010. If you followed IT in the last years, you might remember that Stuxnet was discovered around mid-2010 and at the time it was used against the Iranian nuclear program. The […]

Pierluigi Paganini March 13, 2015
80 percent of merchants fail PCI DSS compliance assessment

The Verizon’s 2015 PCI Compliance Report reveals that eighty percent of merchants fails interim PCI DSS compliance assessment. According to a new report by Verizon Communications Inc., nearly 80 percent of global merchants, including retailers, financial institutions, and hospitality firms are not in compliance with card data security standards. The Reuters agency reported that 5,000 merchants in 30 countries […]

Pierluigi Paganini March 12, 2015
Killer USB – how to burn a PC with a USB device

The security expert Dark Purple detailed its experiment for building a weaponized Killer USB device that could be used to burn a machine. Is it possible to use an apparently USB drive to kill an individual? It seems the scene of a Sci-Fi movie, anyway it is an interesting topic to explore. Let’s read together […]

Pierluigi Paganini March 12, 2015
ECIPS – SKYPE HOSTS ID THEFT FAKE ACCOUNTS

European Centre for Information Policy and Security (ECIPS) reported identity thefts to Skype, but the company refused to take down the fake account. Skype refused to take down a fake account after it was notified by the European Centre for Information Policy and Security, ECIPS that it was hosting two fake accounts in the name […]

Pierluigi Paganini March 12, 2015
EquationDrug, the hacking platform of the Equation Group APT

Experts at Kaspersky Lab published a detailed analysis of the EquationDrug platform and its modules developed by the Equation Group APT. Recently experts at Kaspersky Lab have uncovered the Equation Group hacking crew, the most sophisticated ever APT. Security researchers at Kaspersky Lab revealed that the capabilities of the Equation Group surpass anything known in […]

Pierluigi Paganini March 12, 2015
Hacking Facebook by exploiting two reflected file download flaws

A security researcher has discovered two different  reflected file download flaws in Facebook that could be exploited to hit its users. Security researcher David Sopas from WebSegura has discovered a couple of security flaw in Facebook that could be exploited by an attacker respectively to upload an arbitrary file to the social network or to gain control […]