Digital ID

Pierluigi Paganini October 20, 2014
New releases of Tor Browser 4.0 and Tails 1.2 to preserve your privacy

New significant software updates Tor Browser 4.0 and Tails 1.2 are available for the popular Privacy Tools used to preserve online anonymity The Tor project has released a new version of the popular free software for enabling online anonymity Tor, Tor Browser 4.0 is the release Tor Browser Bundle available for download. The Tor Browser Bundle is based on an […]

Pierluigi Paganini October 03, 2014
JPMorgan – 76 million households and 7 million small businesses account exposed

The cyberattack that compromised systems at JPMorgan Chase exposed accounts of 76 million households and seven million small businesses. Data related nearly 76 million households and seven million small business accounts were exposed in the recent hack of the JPMorgan Chase & Co (JPM.N) systems occurred during the summer, making it one of the biggest data breaches in history. […]

Pierluigi Paganini September 29, 2014
SHA-1 has been deprecated, what can I do?

The SHA-1 cryptographic hash algorithm has been known vulnerable, Collision attacks against it are too affordable and attacks will get cheaper soon. Many websites today are using digital certificates signed using algorithms based on the hash algorithm called SHA-1. Hashing algorithms are used to ensure the integrity of the certificate in the signing processes, a flawed […]

Pierluigi Paganini September 07, 2014
EPPB tool copies usable to download victims’ data from iCloud backups

Copies of the Elcomsoft EPPB tool are circulating in the underground and could have been used in the recent leak of celebrity photos. Recently naked pictures of celebrities have been leaked online, but security experts were particularly interested to the news because they speculate that the images have been stolen from the Apple iCloud service. […]

Pierluigi Paganini August 24, 2014
Location services, Google is tracking your every move you make

Location services are considered a serious threat to privacy because data managed by company like Google could be used for online surveillance. Many experts consider privacy a utopia, every activity we make online is constantly tracked and in many cases principal service providers manage much more information than needed. Google company has been accused many times […]

Pierluigi Paganini August 18, 2014
New powers for the Russian surveillance system SORM-2

The Russian Prime Minister Dmitry Medvedev has signed a decree that will extend the use of SORM-2 to social network surveillance. It’s known that the Russian Government is applying a strict surveillance on the Internet within the country, the Kremlin has developed a system code named “SORM-2” to monitor Russian citizens. The Russian Government has […]

Pierluigi Paganini July 10, 2014
Google blocked unauthorized digital certificates issued by NIC India

Google Security experts have detected and blocked unauthorized digital certificates for a number of its domains issued by the NIC of India. Google announced to have blocked unauthorized digital certificates for different of its domains issued by the National Informatics Centre of India, which holds several intermediate CA certificates trusted by the Indian Controller of Certifying Authorities (India CCA). […]

Pierluigi Paganini June 30, 2014
Facebook experiment shows feasibility of massive-scale emotional contagion through social networks

A Facebook experiment conducted with the Cornell and the University of California provides evidence of massive-scale emotional contagion through social networks. Facebook is the subject of a heated debate for a psychological experiment the company has conducted on nearly 700,000 people without their knowledge. The Facebook experiment was carried out in 2012 and was related to the manipulation of content on […]

Pierluigi Paganini May 21, 2014
Outlook Android App stores emails in plain text on mobile

Researchers at Include Security discovered that the Outlook.com Android App leaves user email messages unprotected by default on the mobile SD cards. A Microsoft Outlook client app for the Android platform lacks of encryption for the storage of email messages on the device’s SD cards. The unique protection mechanism implemented for the Outlook app is a […]

Pierluigi Paganini May 10, 2014
Federal Trade Commission – Watch out to Health and Fitness Apps

The Federal Trade Commission debated on the privacy ramifications of consumer generated and controlled health data, following data on mobile apps. The Federal Trade Commission has recently released the disconcerting results of a study conducted on 12 mobile health and fitness apps, focusing the analysis on the way they manage users’ personal information. Let me anticipate that […]