Breaking News

Pierluigi Paganini August 19, 2015
AT&T secretly helped Spy agency, suggests new NSA leaked documents

The US National Security Agency has utilized an exceptional, decades-old association with AT&T to snoop on Internet utilization, as per recently uncovered reports spilled by Edward Snowden. The archives gave by the previous NSA foreman and checked on by The New York Times and ProPublica portrayed a “profoundly synergistic” telecom titan that showed a “great […]

Pierluigi Paganini August 19, 2015
CVE-2015-3842 – A new critical flaw threatens Android users

CVE-2015-3842 is a new flaw affecting the Android mediaserver, which can be exploited to perform attacks involving arbitrary code execution. The problems for Android users continue, a long serie of vulnerabilities has been discovered by the experts in the last weeks, Stagefright, zero-day zero-day deserialization, and Certifi-Gate are the names of some of the flaw recently […]

Pierluigi Paganini August 19, 2015
Critical Zero-Day flaw – Microsoft Pushes Emergency IE Patch

Microsoft has pushed an emergency patch to remediate a zero-day vulnerability in Internet Explorer that is actively being exploited in-the-wild. Today, August 18th, 2015, Microsoft released an emergency patch after being notified of a critical vulnerability in all supported versions of Internet Explorer. All versions of Microsoft Internet Explorer from IE7 to IE11 are affected by this zero-day vulnerability. […]

Pierluigi Paganini August 18, 2015
Windows 10 allows Microsoft to remote disable pirated software and hardware

A report revealed that Microsoft could scan PCs running Windows 10 searching for pirated games and unauthorized hardware and disable them. One thing is certain, for better or for worse, we are talking a lot about the new Microsoft operating system Windows 10. The experts mainly expressed privacy concerns around the Windows 10 OS, they […]

Pierluigi Paganini August 18, 2015
Hidden Tear Ransomware is now open Source and available on GitHub

The Turkish security researchers Utku Sen has published the first open source ransomware  for educational purposes that anyone can use. Ransomware is now open Source and available in GitHub. Ransomware is one of most dangerous cyber threats for end-users, in the recent months the number of ransomware in the wild is increased as never before. Criminal […]

Pierluigi Paganini August 18, 2015
ICS-CERT warns for 0-Day vulnerabilities in SCADA systems

The ICS-CERT has recently published six security advisories to warn organizations about a number of 0-day flaws in SCADA systems. The ICS-CERT has published six advisories to warn organizations about the presence of Zero-Day Flaws in SCADA Systems. Aditya K. Sood, security researcher at Elastica, has revealed in a talk at the Def Con 2015 conference several vulnerabilities […]

Pierluigi Paganini August 18, 2015
SS7 flaw allows hackers to spy on every conversation

By Exploiting a flaw in the SS7 protocol hackers can access every conversation and text message mobile users send from everywhere in the world. Hackers can spy on every mobile phone user wherever it is. Channel Nine’s 60 Minutes has revealed the existence of a security hole in modern telecommunication systems that could be exploited by […]

Pierluigi Paganini August 17, 2015
An Italian expert discovered two zero-day flaws in MAC OS X

An Italian security researcher has discovered two zero-day vulnerabilities in Apple MAC OS X that could be exploited to gain remote access to a PC. An Italian teenager, Luca Todesco, has found a couple of critical zero-day vulnerabilities in Apple OS X operating system that could be exploited to gain remote access to a PC. The […]

Pierluigi Paganini August 17, 2015
Antivirus industry damaged by the Kaspersky’case

Kaspersky sustains the Reuters’s story on Antivirus false positives is based on information provided by anonymous former KL employees which are not reliable Some days ago, Reuters published a story about Kaspersky revealing that the Russian company was creating malicious codes to give them an upper hand against their direct competitors. Eugene Kaspersky in the […]

Pierluigi Paganini August 17, 2015
Exploiting BitTorrent flaws to run Distributed Reflective DDoS

Security researchers discovered a new technique to exploit BitTorrent to run powerful DDoS amplification attacks that could bring down great websites. A weaknesses in the open BitTorrent protocol makes some of the most widely used BitTorrent applications, including uTorrent, Mainline, and Vuze vulnerable to a form of denial of service attack. The form of DDoS […]