Breaking News

Pierluigi Paganini April 03, 2015
Google goes on the Offensive versus Ad Injectors

Google has announced serious actions to prevent ad injectors that compromise the integrity of users’ browsing experience across the globe. Google has declared “war” on programs that compromise the integrity of users’ browsing experience across the globe.  In a recent blog post featured on Google’s Online Security Blog, Google has released information surrounding research that […]

Pierluigi Paganini April 03, 2015
TrendMicro spotted a 64-Bit variant of NewPosThings PoS malware

Researchers at Trend Micro spotted a 64-bit variant of NewPosThings PoS malware designed to steal payment card and other sensitive data. Researchers at Trend Micro have identified a new strain of the NewPosThings point-of-sale (PoS) malware. The new variant of NewPosThings malware is a 64-bit version of NewPosThings, a point-of-sale (PoS) malware discovered by experts at Arbor Networks in […]

Pierluigi Paganini April 02, 2015
Obama signed an executive order as deterrent against hacking

A new executive order signed by the US President Obama imposes sanctions against every entities that is threatening US assets, even overseas hackers The President of United States, Barack Obama has signed an executive order that uses economic restrictions to “control” anyone that is trying to attack any American interests. But what this exactly means? […]

Pierluigi Paganini April 02, 2015
Fake Pirate Bay website exploited to serve banking Trojan to WordPress users

Security experts at MalwareBytes discovered that unaware WordPress users are infected with a banking trojan served by a fake Pirate Bay website. Some WordPress websites are being used to redirect users to a fake Pirate Bay that is being used to make the reader to push malware, says Malwarebytes. WordPress websites were injected with the same iframe during the […]

Pierluigi Paganini April 02, 2015
mDNS can be abused to amplify the traffic of DDoS attack

A security researcher discovered that the improper configuration of some multicast DNS (mDNS) implementations could be used to amplify DDoS attacks. The multicast Domain Name System, also known as mDNS,  is a multiplatform service designed to resolve host names to IP addresses within small networks that doesn’t have a local name server. The mDNS can work in a […]

Pierluigi Paganini April 02, 2015
POODLE flaw still affects hundred thousand Australian home routers

Security experts revealed that more than 100,000 home routers belonging to Australian households are still vulnerable to the PODDLE vulnerability. Once again, home routers are exposed to the risk of cyber attacks. This time the news is related to the Australian consumer broadband modems that resulted affected by the Poodle and Freak vulnerabilities. Many Australian households […]

Pierluigi Paganini April 01, 2015
There was a flaw in YouTube that allowed removal of any video

A Russian researcher has discovered a critical vulnerability in YouTube that could have been exploited by a hacker to delete any video from the website. The Russian security researcher Kamil Hismatullin has discovered a critical flaw in YouTube that could be exploited by attackers to delete any video the popular video sharing service. The bug hunter is […]

Pierluigi Paganini April 01, 2015
A researcher discovered two security issues in the GITHUB platform

A security researcher discovered a couple of security issues on GitHub platform explaining how it is possible to exploit them in real attack scenarios. The researcher David Sopas (@dsopas) from Websegura discovered a couple of security issues in the coding website GitHub that were ranked by the company as minor, but that could expose users to cyber attacks. […]

Pierluigi Paganini April 01, 2015
PRESIDENT OF ECIPS, MR BARETZKY SPEAKS AT 2015

President of ECIPS warns of cyber terror problems ahead at C I P R congress.  Terrorism is evolving with cyber warfare capability. Critical Infrastructure Protection & Resilience meetings were attended by almost every agency in EU and US defense department. The Critical Border Cyber Defense Infrastructure of the EU Critical Infrastructure Protection & Resilience     […]

Pierluigi Paganini April 01, 2015
Volatile Cedar, the cyber espionage campaign from Lebanon

Volatile Cedar APT group is a new hacking team, apparently from Lebanon, that compromised systems worldwide, most of those in Israel Security experts from Check Point Software Technologies have uncovered a new cyber espionage campaign, dubbed Volatile Cedar, that targeted hundreds of entities from at least ten countries (Lebanon, Israel, Turkey, the UK, Japan, the US, etc.). The […]