Breaking News

Pierluigi Paganini March 05, 2015
Financial Trojans in 2014 – Symantec reports a significant drop in infections

Symantec revealed observed a significant drop in the number of  Financial Trojans in 2014, a report includes a detailed analysis of the phenomena. Symantec has analyzed the evolution of Financial Trojans in 2014 highlighting a significant drop in the number of detection of malicious agents. Symantec analyzed nine common financial Trojans during 2014, the sample analyzed targeted […]

Pierluigi Paganini March 04, 2015
GoDaddy accounts compromised to run a campaign based on Angler kit

Experts at Cisco discovered a new technique dubbed Domain Shadowing consisting in the creation of thousand subdomains used to spread the Angler exploit kit Cyber criminals have used hundreds of legitimate domain name accounts registered through GoDaddy to run a malicious campaign using the popular Angler exploit kit. Crooks hacked domain name accounts in order […]

Pierluigi Paganini March 04, 2015
Twitter locked down Tor by requiring a phone number for sign-up

Internet users that want to create a new account on Twitter through the Tor network must now provide a phone number to verify their identity. A few days ago, Twitter announced plans to begin tracking users via their mobile phone number, a measure that the company consider necessary in order to fight the trolls. Following the […]

Pierluigi Paganini March 04, 2015
FREAK, the new vulnerability that threatens the IT industry

FREAK, a new major security flaw that left users of Apple and Google devices exposed to MITM attack while visiting supposedly secure Websites. IT industry is facing with a new major security SSL/TLS vulnerability that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of […]

Pierluigi Paganini March 04, 2015
Weaknesses in Air Traffic Control Systems are a serious issue for FAA

A GAO report to FAA reveals that the systems adopted in the Aviation industry are still affected by weaknesses that could be exploited by hackers. A report published by Government Accounting Office (GAO) in January urges the Federal Aviation Administration (FAA) to adopt a formal process to “Address Weaknesses in Air Traffic Control Systems.” The FAA has taken steps […]

Pierluigi Paganini March 03, 2015
phpMoAdmin MongoDB GUI affected by a Zero-Day Remote Code Execution flaw

Security experts are alerting on the availability in the underground black market of a zero day exploit for a vulnerability in the phpMoAdmin MongoDB GUI. In February, three students from the University of Saarland in Germany discovered that MongoDB databases running at TCP port 27017 as a service of several thousand of commercial web servers are exposed on the Internet without proper defense […]

Pierluigi Paganini March 03, 2015
Cognitive Fingerprints, the new frontier of authentication

DARPA is working on Cognitive Fingerprints authentication process to validate the user identity through the use of software based biometrics. Security plays a crucial role in today’s world. Whether it is a multi-billion organization or a single person with a computer, security is important for all. One of the pillars for cyber security is the […]

Pierluigi Paganini March 03, 2015
Cyber criminals target call center operators in Apple Pay fraud schema

Cybercriminals are targeting call centers operators in Apple Pay fraud to circumvent the checks implemented by Apple, banks and card issuers. The security expert Cherian Abraham revealed a spike in the fraud on Apple’s mobile payment platform, Apple Pay. The criminals are trying new techniques to compromise the Apple security chain. While the Apple devices and software are […]

Pierluigi Paganini March 03, 2015
D-Link home routers affected by remote command injection flaw

D-Link routers contain a vulnerability that could be exploited by attackers to get root access remotely and run several attacks. Once again security experts have found security vulnerabilities in home routers, these devices are a privileged target of cyber criminals that exploit the flaws in the software they run for several purposes. This time the flawed routers […]

Pierluigi Paganini March 02, 2015
How to serve malware by exploiting Blu-ray disc attacks

A British hacker has found two Blu-Ray-borne attacks that could be run to infect machines, a technique that remind the method used by the Equation Group. Security expert Stephen Tomkinson from NCC Group has discovered a couple of vulnerabilities in the software used to play Blu-ray discs. The exploitation of the flaw could be used to implant […]