Breaking News

Pierluigi Paganini June 24, 2016
Apple confirms iOS 10 kernel source code left unencrypted intentionally

Apple confirms iOS 10 kernel code left unencrypted intentionally to improve OS performance and ensures that it will have no impact on security. The news is intriguing, while Apple announced the new release of its mobile operating system, the iOS 10, the experts discovered that its kernel is unencrypted. The researchers from MIT Technology who reviewed […]

Pierluigi Paganini June 24, 2016
Severe Swagger Remote Code Execution flaw compromises NodeJS, Ruby, PHP, Java

This disclosure of an unpatched Remote Code Exec flaw in the Swagger API framework compromises NodeJS, Ruby, PHP, and Java. Swagger is a representation of RESTful API that allows developers to get interactive documentation, client SDK generation and discoverability. The Swagger generators are privileged tools for organisations to offer developers easy access to their APIs. Currently, the […]

Pierluigi Paganini June 24, 2016
Hacking Uber – Experts found dozen flaws in its services and app

Researchers discovered more than a dozen flaws in Uber app and websites, many of them allow hackers to access driver and passenger info. Security experts from the Integrity firm have found more than a dozen flaws in the Uber website that could be exploited by hackers to access driver and passenger data. The researchers discovered a total […]

Pierluigi Paganini June 23, 2016
What’s really behind China’s drop in attacks against the US?

According to the experts from FireEye attacks from China against the US started declining in mid-2014 and has continued to decrease, why? Earlier this week, FireEye released a report showing a significant decline in cyber-attacks originating from China.  According to the report, the attacks started declining in mid-2014 and has continued.  According to FireEye, the […]

Pierluigi Paganini June 23, 2016
WordPress 4.5.3 fixed several security vulnerabilities

WordPress has recently issued the version 4.5.3 that patches more than two dozen vulnerabilities, including 17 bugs introduced in the last three releases. WordPress is one of the most popular content management systems for this reason is a privileged target of hackers. It is quite easy to scan the web searching for websites running old version affected […]

Pierluigi Paganini June 23, 2016
Tracking stolen smartphone is a bad idea, report it to the Police

Location services could very useful to find lost devices, but do not do anything silly to find your stolen smartphone, it could be very risky. People underestimate the risk related to the use of technology, a simple post on a social network or a harmless SMS could cause serious problems. Today I desire to share […]

Pierluigi Paganini June 23, 2016
Security issues in Libarchive file compression library affect hundreds of projects

Experts from Cisco Talos discovered multiple security issues in the Libarchive library that is used by hundreds of other projects, including FreeBSD. Security vulnerabilities in the popular open source compression toolkit Libarchive affect countless of other projects that include the library. The flaw was discovered by experts from the Cisco Talos team that supported the Libarchive development team to […]

Pierluigi Paganini June 23, 2016
Godless, the Android Malware that employs multiple rooting exploits

Godless is a new strain of Android Malware recently spotted by experts from Trend Micro that leverages multiple rooting exploits. Godless is a new strain of malware that uses multiple rooting exploit to compromise Android mobile devices. The mobile malware is a sort of hacking platform that includes an open-source rooting framework called android-rooting-tools. The […]

Pierluigi Paganini June 22, 2016
Ops … also Zuckerberg covers the webcam with tapes

Like the FBI Director Comey also Zuckerberg use tapes to cover the webcam of his laptop, evidently he fear that someone could spy on him. A Facebook post published by Mark Zuckerberg to celebrate more than 500 million people now use Instagram is attracting the attention of IT experts. In the image that is included in the […]

Pierluigi Paganini June 22, 2016
Pawost Android Malware uses Google Talk to make unwanted phone calls

Researchers at MalwareBytes have spotted a new Android Malware dubbed Pawost that uses Google Talk to make unwanted phone calls. Security experts from MalwareBytes have spotted a new strain of Android malware, dubbed Android/Trojan.Pawost, that implements an unusual feature. The Pawost threat originates from China and is able to use Google Talk to make malicious phone […]