Digital ID

Pierluigi Paganini May 02, 2016
Now we know the identity of Satoshi Nakamoto, the Bitcoin inventor

The mystery about the identity of Satoshi Nakamoto, the founder of the Bitcoin currency scheme, seems to be resolved, the man is Craig Steven Wright. The mystery about the identity of Satoshi Nakamoto, the founder of the Bitcoin virtual currency scheme, seems to be resolved, the man is the Australian entrepreneur Craig Steven Wright. Craig Wright publicly […]

Pierluigi Paganini May 02, 2016
FISA Court approved each and every request made by the government in 2015

According to a Justice Department memo, the FISA ACT Court approved each and every request made by the government in 2015. According to a Justice Department memo, the United States Foreign Intelligence Surveillance Act (FISA) Court approved each and every request made by the government in 2015. All of the 1,457 requests made last year […]

Pierluigi Paganini April 29, 2016
Psst! You just leaked your Slack’s token on Github!

Developers often ignore that they are exposing sensitive data when they publish code containing their Slack access tokens on GitHub. It was the year 2015, the month of March when Slack officially posted the following statement on their corporate blog: “there was unauthorized access to a Slack database storing user profile information. We have since […]

Pierluigi Paganini April 29, 2016
Employee Monitoring, a controversial topic

Employee monitoring is a complex and controversial topic that can often become the source of discontent between employers and their staff. It is not a secret that most employees have a negative opinion about modern monitoring practices, such as PC monitoring. It is often viewed as an invasion of privacy and employer overstepping their authority. […]

Pierluigi Paganini April 25, 2016
DARPA calls for a hacker-proof encryption App, and it will pay it

The Defense Advanced Research Projects Agency is calling for the development of a hacker-proof encryption App for the U.S. military. The US Defense Advanced Research Projects Agency (DARPA) is calling security experts to create a hacker-proof “messaging and transaction platform.” The project for a hacker-proof encryption App was proposed under the rules of the Small Business Technology Transfer […]

Pierluigi Paganini April 15, 2016
Canadian law enforcement obtained BlackBerry Global encryption Key

A report published by the VICE News confirmed that the Canadian law enforcement obtained the BlackBerry encryption Key under the investigation Op Clemenza. BlackBerry is probably the first mobile vendor that implemented end-to-end encryption to protect communications of its users. Now an embarrassing report published by Vice News revealed that BlackBerry has shared a master Key to […]

Pierluigi Paganini April 14, 2016
Also the FBI Director Comey puts a tape over the webcam

During the Q&A session at Kenyon College last week, the FBI Director explained that he uses tape to mitigate the danger of cyber espionage. Privacy and security are top priorities for some security experts that are aware of threat actors’ capabilities, so I’m not surprised that the FBI Director James Comey uses to cover his laptop webcam […]

Pierluigi Paganini March 18, 2016
DB of the Kinoptic iOS app abandoned online with 198,000 records

Chris Vickery has discovered online the database of the Kinoptic iOS app, which was abandoned by developers, with details of over 198,000 users. The security researcher Chris Vickery has discovered a database belonging to an abandoned iOS app, the Kinoptic iOS app, that is exposing on the Internet personal details of over 198,000 users. The Kinoptic iOS app allowed […]

Pierluigi Paganini March 15, 2016
Fujitsu targets payment industry with PalmSecure Technology

Fujitsu has announced plans to launch its digital payment system PalmSecure Technology in Europe that is a security solution for biometric identification Fujitsu has announced plans to launch its digital payment system PalmSecure in Europe that is a security solution for biometric identification, which is offering the perfect user authentication for payment scenarios. It operates touchless, highly […]

Pierluigi Paganini March 10, 2016
Tracking users on the Tor Network through mouse movements

A security researcher has devised a new technique to track users by analyzing the mouse movements, even when surfing on the Tor network. While we surf on the Internet we leave an impressive amount of traces that could be used to track our profile and also reveal our identity even we are visiting resources in the darknet. The […]