Breaking News

Pierluigi Paganini August 03, 2015
FDA says healthcare providers to stop using older drug infusion pumps made by Hospira

Food and Drug Administration invited healthcare providers to stop using older drug infusion pumps made by Hospira due to the risk of cyber attacks. A few months ago security experts highlighted the risks related to the hacking of older drug infusion pumps, we discovered that certain versions of common drug infusion pumps are affected by numerous […]

Pierluigi Paganini August 03, 2015
After the OPM Hack, the United States will strike back China

The US will strike back China in response to the recent wave of cyber attacks against Government offices, including the Office of Personnel Management. Recently, the New York Times published an article saying that the president of the United States, Barack Obama took the decision to retaliate against China, after the famous hack of the […]

Pierluigi Paganini August 03, 2015
Hijacking Satellite Communications with a $1,000 Device

A security researcher demonstrated how to hack a satellite tracking technology with a $1,000 device made of off the shelf components. Colby Moore, a security expert from security firm Synack, will present in a talk at the next Black Hat Conference how to hack satellite tracking technology by using a $1,000 device made of off […]

Pierluigi Paganini August 02, 2015
Operation Potao – hackers used a trojanized version of TrueCrypt

ESET issued a report on a cyber espionage campaign dubbed Operation Potao that relied on the diffusion of a trojanized Russian language version of TrueCrypt. Despite TrueCrypt development was mysteriously interrupted last year, the popular open-source encryption tool still represents the ideal choice for individuals that need to encrypt their data. Recently ESET published an interesting report […]

Pierluigi Paganini August 02, 2015
Security Affairs newsletter Round 20 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. HORNET, the High-Speed Tor-Like encrypted anonymous network Anonymous’s team GhostSec thwarts Isis terror plots Drone Firing Semi-Automatic Handgun, what’s next? Advertising hijacking made by Invisible rogue mobile apps are […]

Pierluigi Paganini August 02, 2015
Microsoft Windows 10 spies on you by default

While Microsoft is offering for free it new Windows 10 OS, security experts argue that the cost for user privacy is much higher. Microsoft Windows 10 is the new operating system of the IT giant, the newborn already reached more than 14 million downloads in just two days. The experts who have already analyzed Windows 10 […]

Pierluigi Paganini August 02, 2015
Hacking Industrial Ethernet Switches to take over nuclear plants

Hackers can exploit the vulnerabilities affecting Industrial Ethernet Switches and take control over Nuclear Power Plants and other critical infrastructure. The increasing number of incidents occurred in these years demonstrated that a cyber attack could cause serious damage to industrial processes. It is enough that hackers find and exploit a simple vulnerabilities in one of […]

Pierluigi Paganini August 01, 2015
Bitdefender Hacked, customer data being sold In the underground

Antivirus firms BitDefender has been hacked and data belonging to its customer have been leaked online. Hackers requested a $15,000 ransomware. Hackers are raising the bar, one of the most popular Antivirus firms BitDefender has been hacked and data belonging to its customer have been leaked online. The data breach highlighted serious security issues in the […]

Pierluigi Paganini August 01, 2015
MIT researchers identify Tor hidden services with 88 percent accuracy

Researchers have successfully carried out a traffic correlation attack against the Tor Network identifying hidden services with 88 percent accuracy. Researchers from the Massachusetts Institute of Technology (MIT) have discovered a vulnerability in Tor which lead the identification of hidden services with up to 88 percent accuracy. The team of experts composed of researchers from […]

Pierluigi Paganini August 01, 2015
A new flaw in BIND is threatening the Internet’ core

A new vulnerability affects Bind, the open-source software that implements the Domain Name System (DNS) protocols for the Internet. BIND is used by servers for translating human-friendly domain names into IP addresses. This vulnerability could be exploited by a  lone hacker to bring down swaths of the Internet. The problem affects all the major versions […]