Breaking News

Pierluigi Paganini July 09, 2016
Facebook Messenger implements End-to-End Encryption

Facebook Messenger Starts Testing End-to-End Encryption with Secret Conversations, it is already available for a limited number of users. Facebook is planning to use end-to-end encryption for its Messenger app and has begun rolling out the feature. Facebook has called the new feature ‘Secret Conversations’ and will allow Messenger users to exchange messages that no […]

Pierluigi Paganini July 08, 2016
Ghost Squad hackers dox United Cyber Caliphate including Mauritania Attacker

Hacktivists from Ghost Squad Hacker group made revealed the identities of hackers affiliated with the ISIS cyber army called United Cyber Caliphate. Ghost Squad Hackers (GSH), a hacktivist group made public the identities of hackers affiliated with the ISIS cyber army called United Cyber Caliphate, including leader Mauritania Attacker. Facebook:https://t.co/VU25BTX4Gc pic.twitter.com/h7g4D1gQjd — s1ege (@s1ege_) 7 […]

Pierluigi Paganini July 08, 2016
PoS systems infected in 1 in 20 Wendy’s stores, credit card exposed

The hack suffered by Wendy’s fast-food chain was bigger than thought, payment card data exposed in more than 1000 stores. The hack suffered by Wendy’s fast-food chain was bigger than thought and exposed sensitive information, including credit card data. Roughly one on three Wendy’s burger was hacked, a malware has infected PoS systems. Just after the […]

Pierluigi Paganini July 08, 2016
Flaws in BMW ConnectedDrive Infotainment System allow remote hack

A research discovered two zero-day vulnerabilities residing in the official BMW web domain and ConnectedDrive portal that allow remote hack. Once again IoT devices are affected by a serious flaw that could be exploited by hackers to compromise them, this time we speak of Car Hacking. Almost any modern connected vehicle uses a drive-by-wire system that […]

Pierluigi Paganini July 08, 2016
A flaw in the D-LINK WI-FI camera affects more than 120 products

A vulnerability in the firmware running on many D-Link products allows attackers to take over cameras and other 120 products. A month ago, the Senrio research team discovered and exploited a remote code execution vulnerability in the latest firmware of the D-Link DCS-930L Network Cloud Camera. The vulnerability allows code injection which lets the attackers […]

Pierluigi Paganini July 07, 2016
The EU passed the NIS directive, its first ever cyber security rules

The EU has passed the new NIS directive that establishes minimum requirements for cyber-security on critical infrastructure operators. The European Parliament has passed the new network and information security (NIS) directive that establishes minimum requirements for cyber-security on critical infrastructure operators. The NIS directive has a significant impact on all the businesses that supply essential […]

Pierluigi Paganini July 07, 2016
Watch out the Satana ransomware is comining

A newly emerging strain of malware dubbed Satana, which was first spotted last week, appears to be basing itself on crypto-lockers Petya and Mischa. Experts from Malwarebytes Labs have described the malicious software to be in the stage of “malware-in-development” with expected growth and evolution to occur over the coming weeks as its popularity and use […]

Pierluigi Paganini July 07, 2016
Unmasking malware’s use of TLS without flow decryption

Researchers devised a method to unmask malware’s use of TLS without decrypting the data flow. The technique relies on analysis of observable data features. A team of security experts from Cisco demonstrated that it is possible to detect a malware in TLS connections without decrypting the traffic and block it. The researchers Blake Anderson, Subharthi Paul […]

Pierluigi Paganini July 07, 2016
New Locky variant – Zepto Ransomware Appears On The Scene

New threat dubbed Zepto Ransomware is spreading out with a new email spam campaign. It is a variant of the recent Locky Ransomware. The news was recently reported in a blog post by the Cisco Talos team: “We are watching Zepto very carefully. It’s closely tied to Locky, sharing many of the same attributes,” said Craig Williams, […]

Pierluigi Paganini July 07, 2016
Eleanor malware uses a Tor backdoor to control Macs

A malicious application named EasyDoc Converter.app delivers a sophisticated malware dubbed Eleanor malware that opens a Tor backdoor on the victim’s machine. Experts from security firm Bitdefender have spotted a new malware, dubbed Eleanor malware (Backdoor.MAC.Eleanor), that once compromised Macs set up a backdoor through Tor network. The malicious application, dubbed EasyDoc Converter.app, pretend to be a […]