Breaking News

Pierluigi Paganini March 01, 2015
Shadow Cloud Services a serious risk for Government Networks

Cloud Security Alliance revealed that shadow cloud service used by employees and unmanaged by IT can pose a major security problem for organizations. Last month, Cloud Security Alliance found out that shadow cloud service used by employees and unmanaged by IT can pose a major security problem for organizations. Based on the survey, mostly half […]

Pierluigi Paganini March 01, 2015
TorrentLocker campaign uses email authentication to tune the operations

The emails of a new TorrentLocker campaign use Domain-based Message Authentication, Reporting and Conformance (DMARC) to avoid detection and collect data. Cyber criminals are continuously improving the technique to spread malicious code and avoid detection systems. Recently security experts at Trend Micro noticed an improvement in the evasion techniques implemented by malware authors to spread the […]

Pierluigi Paganini February 28, 2015
Twitter is tracking phone numbers to prevent trolls and abuses

Twitter announced that it is starting to track phone numbers of users as a measure to prevent abuses like the creation of new bogus accounts. A few weeks ago, Twitter CEO Dick Costolo explained the difficulties the company is facing to prevent the abuse of its platform. Costolo revealed to be embarrassed for the company’s […]

Pierluigi Paganini February 28, 2015
The transportation giant Uber discloses a Data Breach

The giant Uber announced a data breach that resulted in unauthorized access to the driver partner license numbers of roughly 50,000 of its drivers. Are you a user of the Uber service? There is a bad news for you! Uber also enters the long list of companies who are victims of a data breach. On Friday, […]

Pierluigi Paganini February 28, 2015
FireEye Assessment of 7 Million iOS and Android Apps shows a disconcerting scenario

FireEye released a report containing the results of a comprehensive Mobile Threat Assessment of 7 Million iOS and Android Apps. According to U.S. firm FireEye, more than five billion downloaded Android apps are vulnerable to cyber attacks due to the presence of security vulnerabilities in the Android OS. Researchers at FireEye analyzed more than 7 million […]

Pierluigi Paganini February 27, 2015
Cyber criminals target trading algorithms to steal related code

Security firms discovered a significant increase in the number of targeted attacks aimed at stealing the code related trading algorithms. Cyber criminal organizations appear more interested in target trading algorithms, patents, trade secrets than other kinds of information, this is the new trend observed by security experts. Cyber criminals are increasing their activity against private […]

Pierluigi Paganini February 27, 2015
Pharming attacks exploit default passwords to hack routers

Experts at Proofpoint uncovered a pharming attack that uses phishing to exploit router vulnerabilities and carry out malicious activities. Security firm Proofpoint revealed that its experts recently detected a spam campaign targeting organizations and primarily Brazilian Internet users. The spam campaign implements a very effective technique to spy on a victim’s Web traffic. The particularity of this […]

Pierluigi Paganini February 27, 2015
Tor Browser 4_0_4 Release improves security and privacy

The Tor Project has announced a new version of Tor Browser Bundle, Tor version 4.0.4, that improves privacy and security features. The Tor Project has announced a new release of the Tor Browser Bundle, Tor Browser version 4.0.4, that improves privacy and security features implemented by the popular anonymizing software. The Tor Browser is used by Internet users […]

Pierluigi Paganini February 27, 2015
Joomla Reflection DDoS attacks exploit a Google Maps Plugin flaws

Akamai firm discovered numerous attacks exploiting a known vulnerability in a Google Maps plugin to run Joomla Reflection DDoS attacks against enterprises. Experts from Akamai Technologies’ Prolexic Security Engineering and Response Team (PLXsert) have discovered a vulnerability allows attackers to turn Joomla servers using the Google Maps plugin into a DDoS hacking tool. The worrying aspect […]

Pierluigi Paganini February 26, 2015
Mysterious sightings of drones in the sky of Paris

Mystery drones have flown over landmarks in central Paris for the second night, authorities still searching for the operators, it’s a mystery. The rapid diffusion of drones in both civil and military industries is rising a heated debate on privacy and security guaranteed by their technologies. Security experts fear that technologies that equip the UAVs could be abused […]