Breaking News

Pierluigi Paganini February 25, 2015
McAfee Labs Threat Report – many mobile apps still vulnerable

The McAfee Labs Threat Report: February 2015 analyzes security level of mobile apps and the evolution of principal cyber threats. Last year the Carnegie Mellon University’s Computer Emergency Response Team (CERT) analyzed the level of security implemented by Android applications, in particular the experts focused their investigation on Android applications that failed to properly validate SSL certificates. The […]

Pierluigi Paganini February 24, 2015
NSA Director Rogers urges the creation a legal framework for the US authorities

The NSA Director Rogers urges the creation of an independent legal framework to regulate the operations conducted US authorities. The NSA director and commander of U.S. Cyber Command, Admiral Michael Rogers, told a Washington cybersecurity forum that legislators need the creation of a legal framework to regulate the operations conducted by law enforcement and intelligence-gathering organizations worldwide. […]

Pierluigi Paganini February 24, 2015
Lizard Squad run a DNS hijacking against the Google Vietnam website

Alleged Hacker belonging to the hacking crew Lizard Squad run a DNS hajacking attack against the Google Vietnam domain. A nasty surprise for Internet users who visited the Google Vietnam website that was presented with a picture of a man taking a selfie, along with a message that claimed the website site was hacked by the […]

Pierluigi Paganini February 22, 2015
Samsung smartTVs don’t encrypt voice and text data

Samsung smartTV send unencrypted voice recognition data and text information across the Internet without encrypt it, allowing hackers to capture them. A few days ago I was one of the first to publish the news about the Samsung privacy policy that reports smartTV are sending user voice data to third parties. “Samsung SmartTV transmits data […]

Pierluigi Paganini February 22, 2015
Rule 41 – Google against the expansion of FBI hacking powers

The Us Justice Department’s proposal to grant FBI Rule 41 specific hacking rights is under high scrutiny. While the amendment is being reviewed, the Advisory Committee on Criminal Rules will consider public objections, including a letter from Google. The amendment to the Federal Rule of Criminal Procedure 41 (Rule 41) would expand jurisdiction for judges to […]

Pierluigi Paganini February 21, 2015
Verisign report – The rise of DDoS attacks as a service

A new report published by Verisign provides useful data related to the recent evolution of DDoS attacks and the services that offer them. DDoS attacks are even more dangerous for every organization that exposes its resources and services on the Internet, recent attacks against Sony PSN network and XBox live service demonstrate it. DDoS attacks despite […]

Pierluigi Paganini February 21, 2015
Onion.City the new search engine for the Deep Web simply use a common browser

Onion.City the new search engine specialized for the black markets in the Deep Web simply accessible from a common browser. We have described several times the not indexed portion of the web known as the Deep Web, an impressive amount of content that the majority of netzens totally ignore. Deep Web is also known for the anonymity […]

Pierluigi Paganini February 20, 2015
PowerOffHijack malware spies on user when Mobile is off

Security researchers at AVG have discovered a new Android malware dubbed PowerOffHijack, which spies on users even when mobile is switched off. Security researchers at AVG have discovered a new strain of Android malware which is able to spy on mobile users even when their mobile is off. The malware could be used to control victim’s […]

Pierluigi Paganini February 19, 2015
Serious flaws allowed the deletion of any comment on Facebook

A young hacker disclosed the details of an attack that by exploiting a couple of flaws in Facebook allowed him to delete any comment on the social network. The 19-year-old hacker Joe Balhis has discovered the way to delete any comment on Facebook by leveraging a session validation flaw and a cross-site request forgery (CSRF) vulnerability. The expert highlighted that […]

Pierluigi Paganini February 19, 2015
Lenovo sold laptop with pre-installed Superfish malware

The Lenovo computer company knowingly shipped laptops with pre-installed Superfish malware. And ‘controversy on the web, users are outraged. Lenovo is in the storm one again, security experts discovered that the company is shipping laptops with Superfish malware , a malware that allows to steal web traffic using man-in-the-middle attacks. SuperFish is considered by many antivirus companies as […]