Breaking News

Pierluigi Paganini March 02, 2015
How to serve malware by exploiting Blu-ray disc attacks

A British hacker has found two Blu-Ray-borne attacks that could be run to infect machines, a technique that remind the method used by the Equation Group. Security expert Stephen Tomkinson from NCC Group has discovered a couple of vulnerabilities in the software used to play Blu-ray discs. The exploitation of the flaw could be used to implant […]

Pierluigi Paganini March 02, 2015
Hacking the hackers : A cyber resilience approach

A cyber resilience approach: the need to become cyber resilient is very essential because eliminating risks completely is impossible. Hacking emerged as a geeky, tech-oriented culture that was a little mischievous, but ultimately was about programming and finding faults or bugs in the code. It has evolved over time to become a criminal activity. The […]

Pierluigi Paganini March 02, 2015
Facebook Policies and New Terms of Use Have Been under Scrutiny in Europe

A recent report about the privacy policy of Facebook has shed light to potential problems and disagreements with legal concerns in the EU. There is a recent report from Belgium focusing on the revised terms of use that have to do with Facebook. Due to its enormous popularity even apart from the fact that it’s […]

Pierluigi Paganini March 01, 2015
Indian Government bans third party email services, including Gmail and Yahoo

The Indian Government bans third party email services, including Gmail and Yahoo, from its offices in order to protect government communications. The Indian government will be monitoring the online activities of official computers, blocking any content not comply with its policy. The authorities will intimate users and, as an ultimate measure, will have the right […]

Pierluigi Paganini March 01, 2015
Shadow Cloud Services a serious risk for Government Networks

Cloud Security Alliance revealed that shadow cloud service used by employees and unmanaged by IT can pose a major security problem for organizations. Last month, Cloud Security Alliance found out that shadow cloud service used by employees and unmanaged by IT can pose a major security problem for organizations. Based on the survey, mostly half […]

Pierluigi Paganini March 01, 2015
TorrentLocker campaign uses email authentication to tune the operations

The emails of a new TorrentLocker campaign use Domain-based Message Authentication, Reporting and Conformance (DMARC) to avoid detection and collect data. Cyber criminals are continuously improving the technique to spread malicious code and avoid detection systems. Recently security experts at Trend Micro noticed an improvement in the evasion techniques implemented by malware authors to spread the […]

Pierluigi Paganini February 28, 2015
Twitter is tracking phone numbers to prevent trolls and abuses

Twitter announced that it is starting to track phone numbers of users as a measure to prevent abuses like the creation of new bogus accounts. A few weeks ago, Twitter CEO Dick Costolo explained the difficulties the company is facing to prevent the abuse of its platform. Costolo revealed to be embarrassed for the company’s […]

Pierluigi Paganini February 28, 2015
The transportation giant Uber discloses a Data Breach

The giant Uber announced a data breach that resulted in unauthorized access to the driver partner license numbers of roughly 50,000 of its drivers. Are you a user of the Uber service? There is a bad news for you! Uber also enters the long list of companies who are victims of a data breach. On Friday, […]

Pierluigi Paganini February 28, 2015
FireEye Assessment of 7 Million iOS and Android Apps shows a disconcerting scenario

FireEye released a report containing the results of a comprehensive Mobile Threat Assessment of 7 Million iOS and Android Apps. According to U.S. firm FireEye, more than five billion downloaded Android apps are vulnerable to cyber attacks due to the presence of security vulnerabilities in the Android OS. Researchers at FireEye analyzed more than 7 million […]

Pierluigi Paganini February 27, 2015
Cyber criminals target trading algorithms to steal related code

Security firms discovered a significant increase in the number of targeted attacks aimed at stealing the code related trading algorithms. Cyber criminal organizations appear more interested in target trading algorithms, patents, trade secrets than other kinds of information, this is the new trend observed by security experts. Cyber criminals are increasing their activity against private […]