Breaking News

Pierluigi Paganini March 17, 2015
OpenSSL announced fix for mystery high critical vulnerability

New versions of OpenSSL will be released on Thursday to patch critical security vulnerabilities, one of which is considered very dangerous. The OpenSSL Project Team announced in an advisory published on Monday that new versions of OpenSSL will be released on Thursday to patch several security vulnerabilities. The disconcerting news is that at least one of them […]

Pierluigi Paganini March 17, 2015
Yahoo launches its on-demand password feature

Yahoo announced its new on-demand password feature that lets users into login in their account with a code sent to their mobile phone. Yahoo has announced a new Password-Free login feature to let users access their account without the need for a password. When users will sign in his account, an on-demand password is sent to a […]

Pierluigi Paganini March 17, 2015
IoT security is still a pipe dream

A research conducted by experts at Symantec highlights disturbing security failures in the IoT devices present in today connected home. The purpose of IoT is connect all type of devices that we have at home, let’s say I am at my work and I want to arrive at home and have my air conditioner at […]

Pierluigi Paganini March 17, 2015
Cardless ATMs will improve security of cash withdrawal

A unit of Canada’s Bank of Montreal will launch on Monday its network of cardless ATMs, a technological innovation to improve users’ security. Recently we have discussed different kinds of attacks against ATM machines, the majority of which were conducted by exploiting hardware skimming. Black box attacks and malware based attacks are a few sample of methods recently observed […]

Pierluigi Paganini March 16, 2015
Cyber attacks against Organizations increased once again

71 percent of organizations were victims of successfully cyber attacks in 2014 according to the “2015 Cyberthreat Defense Report” report. The CyberEdge Group published an interesting report, titled “2015 Cyberthreat Defense Report” that in line with similar studies confirms the increase in the number of successful cyber attacks against organizations. The report analyzed data provided by 814 organizations, it […]

Pierluigi Paganini March 16, 2015
ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has issued its new ICS-CERT MONITOR report related to the period September 2014 – February 2015. The ICS-CERT MONITOR report According to the report, the Industrial Control Systems […]

Pierluigi Paganini March 16, 2015
MPs Try to Ban Tor network for the Common Good, but Raise Concerns

Banning Tor network would bring a lot of public distress and would raise reactions, according to Governmental advisors and thus David Cameron is left without support on the matter of banning encryption. The MPs know really well that the Internet is a really magnificent service that can be used in an excellent manner by simple […]

Pierluigi Paganini March 15, 2015
Google VPN – Revealed the Virtual Private Network service

Pocketables revealed that Google is secretly working on a Virtual Private Network (VPN) service named Google VPN for use on open WiFi networks. Google is working to improve security of its mobile users, according to people at Pocketables the IT giant is secretly working on a Virtual Private Network (VPN) service, dubbed ‘Google VPN’. “Unfortunately, […]

Pierluigi Paganini March 15, 2015
Adobe issued the updates for 11 Critical Vulnerabilities

Adobe released security updates for Adobe Flash Player to fix 11 Critical Vulnerabilities, most of them Remote Code Execution flaws. Adobe has issued a critical update for the Flash Player product that fixes set of 11 critical security vulnerabilities in its software. The update is classified as critical because most of the security flaws could […]

Pierluigi Paganini March 15, 2015
Protecting sensitive data: an approach to prevent data exfiltration

Data exfiltration is mechanism to data breach that occurs when an individual’s or organization’s data is illegally copied from its systems. It’s not a matter of “if” you will be attacked, but “when”. Preventing attackers from breaching our system is a necessity and stopping them before they can complete their mission is a requirement. Analyzing […]