Breaking News

Pierluigi Paganini March 07, 2015
Beware, μTorrent is installing a Bitcoin miner software

Internet users that have recently installed or updated the popular BitTorrent client μTorrent 3.4.2 Build 28913 may have installed a Bitcoin miner. Internet users that have recently installed or updated the popular BitTorrent client μTorrent 3.4.2 Build 28913 had a nasty surprise, the application, in fact, installed a Bitcoin miner as explained in this advisory. “Users […]

Pierluigi Paganini March 07, 2015
Which are the principal threats for children online?

Kaspersky Lab experts carried out a study of the principal threats for children encountered in 2014 by users of the Parental Control module. The Internet is a dangerous place for Children, almost every teenager is always online through desktop PC and mobile device, resulting exposed to dangerous threats. The dangers are not negligible for children […]

Pierluigi Paganini March 06, 2015
SIGA data breach exposed confidential data of 98000 US Military Personnel

Air Force Exchange Service (AAFES) confirms that following the SIGA data breach, confidential data belonging to US military personnel were exposed. A bad news for the US military, the Army and Air Force Exchange Service (AAFES) confirms that, following a the data breach of the German telecom company SIGA Telecom and an AAFES contractor occurred on March 5, […]

Pierluigi Paganini March 06, 2015
Cleaning up the Cyber Mess: Adopting Cyber Hygiene principles

The increasing number of cyber incidents along with a significant improvement of TTP adopted by threat actors requests the adoption of a cyber hygiene. The rate of data breaches are increasing drastically throughout the year. Cyber-attacks could cause severe disruption to a company’s business functions or operational supply chain, impact reputation, compromise customer information or […]

Pierluigi Paganini March 06, 2015
All Windows systems are vulnerable to the FREAK attack

According to a security advisory published by Microsoft all supported versions of Windows are affected by the recently discovered FREAK vulnerability FREAK is major security SSL/TLS vulnerability recently discovered that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of legitimate and secure websites. The critical […]

Pierluigi Paganini March 06, 2015
Time to make you secure from FREAK Vulnerability

FREAK, a new major security flaw that left users of Apple and Google devices exposed to MITM attack while visiting supposedly secure Websites. Few days back security researchers group (named as SMACK ) made everyone aware of a new SSL/TLS vulnerability, termed as FREAK (CVE-2015-0204). FREAK stands for Factoring Attack on RSA-EXPORT Keys. After POODLE, it […]

Pierluigi Paganini March 05, 2015
Drones spying on cell phones for Advertizing campaigns

The Singapore-based company AdNear is using a fleet of commercial drones to determine users’ location and deliver hyper-targeted ads. Drones that spy on unaware people, a nightmare come true, apparently nothing new considering that it is a common practice of law enforcement and Intelligence agency. The bad news is that also a few advertising companies are also […]

Pierluigi Paganini March 05, 2015
Babar and Casper, two Malware likely designed by the French Intelligence

After Babar malware, security researchers detected a new strain of malware dubbed Casper that appears to be linked to the France Intelligence. Surveillance is the primary goal of Intelligence Agencies worldwide, a few weeks ago cyber security researchers detected a new malware, dubbed Babar, that is considered a product of the French intelligence. According to the […]

Pierluigi Paganini March 05, 2015
Financial Trojans in 2014 – Symantec reports a significant drop in infections

Symantec revealed observed a significant drop in the number of  Financial Trojans in 2014, a report includes a detailed analysis of the phenomena. Symantec has analyzed the evolution of Financial Trojans in 2014 highlighting a significant drop in the number of detection of malicious agents. Symantec analyzed nine common financial Trojans during 2014, the sample analyzed targeted […]

Pierluigi Paganini March 04, 2015
GoDaddy accounts compromised to run a campaign based on Angler kit

Experts at Cisco discovered a new technique dubbed Domain Shadowing consisting in the creation of thousand subdomains used to spread the Angler exploit kit Cyber criminals have used hundreds of legitimate domain name accounts registered through GoDaddy to run a malicious campaign using the popular Angler exploit kit. Crooks hacked domain name accounts in order […]