Breaking News

Pierluigi Paganini February 27, 2015
Joomla Reflection DDoS attacks exploit a Google Maps Plugin flaws

Akamai firm discovered numerous attacks exploiting a known vulnerability in a Google Maps plugin to run Joomla Reflection DDoS attacks against enterprises. Experts from Akamai Technologies’ Prolexic Security Engineering and Response Team (PLXsert) have discovered a vulnerability allows attackers to turn Joomla servers using the Google Maps plugin into a DDoS hacking tool. The worrying aspect […]

Pierluigi Paganini February 26, 2015
Mysterious sightings of drones in the sky of Paris

Mystery drones have flown over landmarks in central Paris for the second night, authorities still searching for the operators, it’s a mystery. The rapid diffusion of drones in both civil and military industries is rising a heated debate on privacy and security guaranteed by their technologies. Security experts fear that technologies that equip the UAVs could be abused […]

Pierluigi Paganini February 26, 2015
Doubts about how CSE monitors Canadian emails to the Government

New secret documents leaked by Snowden reveal that CSE monitors millions of Canadian emails to Government, but privacy advocates criticized how CSE does it. Privacy advocates and Canadians are worried by the last bunch of document leaked by Edward Snowden related to the surveillance activities conducted by the Canadian Security Establishment (CSE). The national broadcaster Canadian […]

Pierluigi Paganini February 26, 2015
SIM Maker Gemalto Confirms cyber attacks, but excludes key theft

SIM maker Gemalto confirmed that unknown hackers targeted its systems in the period indicated by Snowden, but denied any massive theft of encryption keys. Just a week ago, the media agencies spread the news that US and British intelligence services have stolen encryption keys of the major SIM card maker Gemalto to spy on mobile […]

Pierluigi Paganini February 26, 2015
More than 1 Million WordPress websites are vulnerable to blind SQL Injection Attacks

A security bug in the WordPress plugin WP-Slimstat could be exploited by attackers to discover a “secret” key and use it to run blind SQL Injections. More than one million WordPress sites are potentially vulnerable to SQL injection attacks due to the presence of a critical flaw in the popular plugin WP-Slimstat. WP-Slimstat is an analytics plugin for […]

Pierluigi Paganini February 25, 2015
The Europol and security giants dismantled the Ramnit botnet

The Ramnit botnet has been shut down in a joint effort by the Europol and the security firms Symantec, Microsoft, and Anubis Networks. Another success For the Europol and its allies Microsoft, Symantec, and Anubis Networks. The organizations in a joint effort have shut down command and control servers of the popular Ramnit botnet. The Joint Cybercrime […]

Pierluigi Paganini February 25, 2015
A $ 3million reward on kingpin behind the GameOver Zeus botnet

The US Justice Department offers $3 million reward for the arrest of GameOver ZeuS kingpin. The botnet was involved in financial frauds on a large-scale. The Justice Department has announced a reward of up to $3 million for the capture of the GameOver ZeuS botnet master. The malicious botnet was used by “a tightly knit gang […]

Pierluigi Paganini February 25, 2015
A new strain of banking trojan VAWTRAK uses Macros and abuses Windows PowerShell

Security experts at TrendMicro observed significant improvements in VAWTRAK banking trojan which couples use malicious macros and Windows PowerShell. Early 2015 the Microsoft Malware Protection Center (MMPC) issued an alert about a surge in the infections of malware using macros to spread their malicious code. The experts MMPC have observed a significant increase in enable-macros […]

Pierluigi Paganini February 25, 2015
McAfee Labs Threat Report – many mobile apps still vulnerable

The McAfee Labs Threat Report: February 2015 analyzes security level of mobile apps and the evolution of principal cyber threats. Last year the Carnegie Mellon University’s Computer Emergency Response Team (CERT) analyzed the level of security implemented by Android applications, in particular the experts focused their investigation on Android applications that failed to properly validate SSL certificates. The […]

Pierluigi Paganini February 24, 2015
NSA Director Rogers urges the creation a legal framework for the US authorities

The NSA Director Rogers urges the creation of an independent legal framework to regulate the operations conducted US authorities. The NSA director and commander of U.S. Cyber Command, Admiral Michael Rogers, told a Washington cybersecurity forum that legislators need the creation of a legal framework to regulate the operations conducted by law enforcement and intelligence-gathering organizations worldwide. […]