Breaking News

Pierluigi Paganini March 11, 2015
Apple and Microsoft released updates to fix the FREAK flaw

Microsoft and Apple released security updates to fix the FREAK vulnerability recently discovered and affecting their products. FREAK is a major security flaw recently discovered that left users of Apple and Google devices exposed to MITM attack while visiting supposedly secure Websites. At the same time Microsoft issued a specific security advisory to inform its […]

Pierluigi Paganini March 11, 2015
Exploiting the Rowhammer flaw in DRAM to control your PC

Researchers at Google’s Project Zero have demonstrated how to exploit Rowhammer problem in DRAM to gain kernel privileges on Linux systems. Security researchers at Google’s Project Zero team have demonstrated that is possible to hijack the Intel-compatible PCs running Linux by exploiting the physical weaknesses in certain varieties of DDR DRAM (double data rate dynamic random-access […]

Pierluigi Paganini March 11, 2015
Worm Gazon, fake Amazon gift card is targeting Android users

Android Gazon malware redirects a potential victim to a webpage that promises an Amazon gift card if you install an APK file hosted on the page. There is a new piece of malware called “Gazon”, and according to “adaptivemobile” already 4000 android users are infected. “Gazon” was discovered on 25 of February and until yesterday […]

Pierluigi Paganini March 10, 2015
How the CIA is working to break the security of Apple devices

A new interesting report published by The Intercept details the effort spent by the US intelligence to compromise the security of Apple devices. The Intercept published another disconcerting post on the US Intelligence campaign aimed to steal the secrets of the IT giant Apple. According to top-secret documents disclosed by The Intercept a team of researchers working with the Central […]

Pierluigi Paganini March 10, 2015
Crooks use seemingly harmless help files to serve CryptoWall ransomware

Experts at Bitdefender revealed that crooks used seemingly harmless help files to distribute a variant of the popular ransomware CryptoWall. The cybercrime never ceases to surprise, every time we discuss a new and effective technique to deceive victims and evade detection mechanisms. Security experts at Bitdefender have discovered a new spam campaign that targeted a few […]

Pierluigi Paganini March 10, 2015
Cyber Experts in North Korea Target the West and Especially Infrastructure of Critical Importance

North Korea holds an impressive army of cyber warriors, with over 3,000 sophisticated professionals. According to the claims of people who have escaped to South Korea, their main target is none other than Western infrastructure of critical value. Over 3,000 cyber experts have been recruited by North Korea, in the country’s attempt to harm the […]

Pierluigi Paganini March 09, 2015
FBI investigating apparent ISIS defacements on Western websites

A number of Western websites were hacked over the weekend, the sites were defaced with messages claiming the ISIS as the responsible. The FBI is investigating a series of cyber attacks occurred over the weekend on several western websites, the authorities suspect the involvement of hackers linked to the ISIS. The list of hacked websites includes […]

Pierluigi Paganini March 09, 2015
Hackers Abuse Google Apps flaw to run phishing campaigns

A critical flaw affecting Google Apps for Work allows hackers to run malicious phishing campaigns by abusing any website’s domain name. A critical vulnerability affecting Google Apps for Work allows attackers to send phishing emails. The vulnerability in Google Apps for Work could be exploited to send emails by abusing any website’s domain name and run phishing campaign on the […]

Pierluigi Paganini March 09, 2015
Spam campaign spreads Dridex Trojan via Macros in XML Files

Experts at Trustwave have discovered a spam campaign composed of several hundred messages trying to serve Dridex trojan though xml documents. Early 2015 security experts discovered a variant of banking malware dubbed Dridex that was spread through a phishing campaign using Microsoft Excel documents embedding malicious macro to infect victims’ machines. The Dridex malware implements features […]

Pierluigi Paganini March 09, 2015
Digital Shadows firm develops a search engine for the Deep Web

Security firm Digital Shadows has realized a search engine for the Deep Web that according the company CEO “sucks in pages in real time”. The deep web is the part of the world wide web not indexed by common search engines, it represents almost all of the content available on the Internet. Law enforcement, intelligence […]