Breaking News

Pierluigi Paganini March 16, 2015
MPs Try to Ban Tor network for the Common Good, but Raise Concerns

Banning Tor network would bring a lot of public distress and would raise reactions, according to Governmental advisors and thus David Cameron is left without support on the matter of banning encryption. The MPs know really well that the Internet is a really magnificent service that can be used in an excellent manner by simple […]

Pierluigi Paganini March 15, 2015
Google VPN – Revealed the Virtual Private Network service

Pocketables revealed that Google is secretly working on a Virtual Private Network (VPN) service named Google VPN for use on open WiFi networks. Google is working to improve security of its mobile users, according to people at Pocketables the IT giant is secretly working on a Virtual Private Network (VPN) service, dubbed ‘Google VPN’. “Unfortunately, […]

Pierluigi Paganini March 15, 2015
Adobe issued the updates for 11 Critical Vulnerabilities

Adobe released security updates for Adobe Flash Player to fix 11 Critical Vulnerabilities, most of them Remote Code Execution flaws. Adobe has issued a critical update for the Flash Player product that fixes set of 11 critical security vulnerabilities in its software. The update is classified as critical because most of the security flaws could […]

Pierluigi Paganini March 15, 2015
Protecting sensitive data: an approach to prevent data exfiltration

Data exfiltration is mechanism to data breach that occurs when an individual’s or organization’s data is illegally copied from its systems. It’s not a matter of “if” you will be attacked, but “when”. Preventing attackers from breaching our system is a necessity and stopping them before they can complete their mission is a requirement. Analyzing […]

Pierluigi Paganini March 15, 2015
TeslaCrypt ransomware encrypts also gaming data

TeslaCrypt is a new strain of ransomware, spotted in the wild by experts at Emsisoft, which is also targeting users of principal gaming platforms. A new strain of ransomware dubber TeslaCrypt was spotted in the wild by the researchers at the security firm Emsisoft. TeslaCrypt was discovered at the end of February, researchers at Bromium that analyzed the […]

Pierluigi Paganini March 14, 2015
2,400 unsafe applications found in average large enterprise

A recent study published by Veracode on mobile security revealed that 2,400 unsafe applications are in average installed in large enterprise. Mobile devices are becoming an integral part of the enterprise architecture, security depends heavily on the use that is made with mobile devices and from the policies adopted to protect the company from cyber […]

Pierluigi Paganini March 13, 2015
A new Facebook Worm exploits multiple cloud services

Security Experts at Malwarebytes security firm spotted a new  Facebook worm that spreads itself by leveraging multiple cloud services. Social media are a privileged attack vector, recent reports published by the principal security firms confirm that cyber criminal are exploiting these platforms for illegal activities. Last disastrous news for the users of the popular social […]

Pierluigi Paganini March 13, 2015
Google privacy breach caused by a software defect

Expert at Cisco discovered a privacy breach caused by a software problem, which exposed personal information of users that opted for privacy setting. A software problem occurred at Google have exposed personal information of users that registered their website and had chosen to keep their profile private. The flaw affected the whois database that contains contact […]

Pierluigi Paganini March 13, 2015
US Government proposed an amendment to fight botnets

Obama Administration proposes giving courts more power to issue botnet injunctions, a measure necessary to fight the diffusion of malicious infrastructures. The US Government has proposed an amendment that would enable the Department of Justice to seek an injunction to prevent the diffusion of botnets. The Obama’s Administration would add activities like the operation of a […]

Pierluigi Paganini March 13, 2015
Microsoft tries to fix again LNK flaw exploited by Stuxnet

A security bulletin recently released by Microsoft addresses the LNK flaw that was exploited by Stuxnet and that we have wrongly considered patched since 2010. If you followed IT in the last years, you might remember that Stuxnet was discovered around mid-2010 and at the time it was used against the Iranian nuclear program. The […]