The United States Department of Defense is still issuing SHA-1 signed certificates for its military agencies, despite they are considered insecure. Today I have published a blog post on the Army Vulnerability Response Program (AVRP), a sort of bug bounty program specific for the US military environment. The idea is to incentive  the ethical disclosure of vulnerabilities […]
A group of experts  has conducted a research that demonstrates the type of data that can be gathered through the forensic study of WhatsApp. A new research conducted by forensic researchers at the University of New Haven (F. Karpisek of Brno University of Technology in the Czech Republic, and Ibrahim Baggili and Frank Breitinger, co-directors of the Cyber […]
Nearly 18,000 Android apps built using the Taomike SDK, and used in China, have been found to include a malicious SMS stealing library. Bad news for Android users, according to according to Palo Alto Networks, nearly 18,000 Android Applications built using the Taomike SDK have been found to include SMS Stealing Library. The Taomike SDK is one […]
Experts at Netcraft discovered that nearly a million SSL SHA-1 certificates were signed with the potentially vulnerable SHA-1 hashing algorithm. Businesses Using Millions of Flawed Certificates, the news is shocking and refers the adoption of SHA-1 certificates, despite the algorithm is considered no more secure. Many big businesses, including firms like Deloitte, are still using SHA-1 certificates, […]
The German researcher Starbug, has demonstrated that it is possible to extract everyoneâs smartphone PIN code from any selfie âimage,â is biometrics secure? The German researcher Jan Krissler, aka Starbug, has demonstrated that it is possible to extract everyoneâs smartphone PIN code from any selfie âimageâ … and much more! Jan Krissler is a popular hacker, he […]
A flaw affecting the way encryption software implements the Diffie-Hellman key exchange algorithm allowed the NSA to break trillions of encrypted connections. Edward Snowden has revealed to the world that the NSA was able to crack also the almost encryption to conduct a large-scale online surveillance. According to Snowden, the intelligence Agency was able to decrypt […]
McAfee Labs has analyzed a number of websites and services in the Dark Web used by the criminal communities for the commercialization of stolen data. You know my passion for the Dark Web, I spend a lot of time monitoring activities in the hidden part of the web with a particular interest in illegal activities that […]
Google listens and records our voice searches, but the majority of the users ignores it. I’ll explain how to listen and delete them from your account. Google knows everything of our digital existence and the story that I’m going to tell you confirm it. The fact that Google keeps track of our researchers is not […]
Microsoft web applications, such as Outlook or OneDrive and account pages, expose visitorsâ Microsoft Identifier (CID) in plain text. A Chinese developer, which uses the pseudonym of ramen-hero, discovered that Outlook.com, OneDrive, and Microsoft’s account pages use a unique user identifier known, also known as CID, in their web applications. The Microsoft CID is a 64-bit integer used […]
Donât throw away your old Boarding Pass, it may contain personal information that could allow attackers to run targeted attacks on you! Donât throw away your old Boarding Pass, it may contain personal information. After finishing your trip, the boarding pass becomes useless, but does that mean that you should throw it in the garbage? […]