Breaking News

Pierluigi Paganini June 24, 2015
Google accused, Chromium eavesdropping tool installed on computers without permission

Privacy advocates claim snooping component was activated within Chromium, potentially exposing private conversations. Privacy advocates are accusing Google. Privacy advocates and open source developers claim over the secret installing of Google software which is capable of listening in on conversations held in the surrounding environment. It seems that the listening component was involuntarily activated within […]

Pierluigi Paganini June 24, 2015
Cryptowall cost victims $18 Million since 2014 warns FBI

Between April 2014 and June 2015, the IC3 received 992 CryptoWall related complaints, with victims reporting losses totaling over $18 million. Cryptowall is one of the most nefarious ransomware in the wild, in twelve months the FBI has estimated that the overall losses were more than $18 million. Ransomware implements a classic extortion scheme typically demanding that victims pay ransom […]

Pierluigi Paganini June 24, 2015
NIST releases cyber security guidelines for government contractors

The NIST has published a document for protecting Controlled Unclassified Information (CUI) when it resides on contractors IT infrastructures. The National Institute of Standards and Technology (NIST) has published a guideline, titled “Publication Citation: Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations“, for protecting Controlled Unclassified Information (CUI) when it resides on contractor IT […]

Pierluigi Paganini June 23, 2015
Adobe fixed the CVE-2015-3113 that is being exploited in the wild

Adobe has released a security update for the critical Adobe Flash Player vulnerability CVE-2015-3113 that is being actively exploited in the wild. Security experts at FireEye discovered a critical heap buffer overflow vulnerability, coded CVE-2015-3113, that affects Adobe systems. FireEye discovered that the Adobe flaw is being exploited in the wild by the hacking crew […]

Pierluigi Paganini June 23, 2015
Microsoft will not patch an IE exploit affecting million 32bit systems

Security expert Dustin Childs publicly disclosed a Microsoft IE exploit that affects only 32-bit IE platforms which are currently used by millions of users. The HP security expert Dustin Childs publicly disclosed a Microsoft IE exploit based on a flaw that resides in the Address Space Layout Randomisation (ASLR). The ASLR is a security feature implemented […]

Pierluigi Paganini June 23, 2015
Disclosed new information about Tor sites

A security researcher is trying to harvest information about Tor sites that propose illegal products, and in some cases he even discovered their address. The Dark Web is known to be “the place” for sites where it can be found drugs, child pornography, weapons, because these websites can live on without disclosing the server location […]

Pierluigi Paganini June 23, 2015
What is the Dark Web and Why is it so popular?

What is the Dark Web? Unveiling the myth of the Dark Web and making sure that people understand its magnitude and its limitations. Let’s begin by explaining what the so called “Dark Web” actually is. This is a term used to describe a collection of websites that may be publicly visible, but they hide information […]

Pierluigi Paganini June 23, 2015
NSA and GCHQ target security firm including Kaspersky

Documents leaked by Edward Snowden show the NSA and the GCHQ efforts to compromise security software companies including Kaspersky Lab.  A new collection of documents leaked by the popular whistleblower Edward Snowden reveals that both UK and US government intelligence agencies are targeting principal security firms and security companies. Kaspersky Lab calls nation-states’ targeting of security companies […]

Pierluigi Paganini June 22, 2015
Kevin Mitnick explains how to hack fiber optic and steal sensitive data

The popular hacker Kevin Mitnick explains how it is easy to steal data from a network tapping the cable, even if it’s a fiber optic network. Kevin Mitnick demonstrates how easy it is for a hacker to tap into your network and read your email messages, even if it’s a fiber optic network. Kevin Mitnick […]

Pierluigi Paganini June 22, 2015
Isis’s propaganda machine hunted down by Europol Web unit

The Europol announced the creation of a team that aims to find key figures in propaganda campaigns run by ISIS members seeking to recruit foreign fighters. Isis‘s machine propaganda is a very important target, since it generates something like 100.000 daily tweets, and it’s used to recruit foreign fighters to support the group. Isis is gaining […]