Security

Pierluigi Paganini December 25, 2016
Moscow wants Apple to unlock iPhone of the killer of the Russian Ambassador

The Russian and Turkish authorities asked Apple to unlock iPhone belonging to the assassin of Russian Ambassador Andrei Karlov. The Russia’s ambassador to Turkey, Andrei Karlov, was killed on Monday during an exhibition in Ankara. The killer is a lone Turkish gunman that shouted “God is great!” and “don’t forget Aleppo, don’t forget Syria!” The shooter was killed […]

Pierluigi Paganini December 24, 2016
Facebook hack allowed to disclose email address for each FB user

A Facebook hack could have been exploited to retrieve the private email address of any user with a serious impact on the privacy. A smart Facebook hack allowed to retrieve the private email address of any user. The issue was discovered by the hacker Tommy DeVoss who awarded with $5,000 under the Facebook Bug bounty program. […]

Pierluigi Paganini December 23, 2016
Cyber attacks against the healthcare industry are expected to grow

The number of cyber attacks against organizations in the healthcare industry is increasing, this trend is expected to continue in 2017. The monitoring of the activity in the cyber criminal underground is essential for investigators and security experts. The value of illegal products and services gives us a precious information on cyber criminal trends. Security experts […]

Pierluigi Paganini December 23, 2016
Signal implements ‘domain fronting’ technique to bypass censorship

The latest update of Signal introduces the ‘domain fronting’ technique that has been implemented to circumvent censorship. Signal is considered the most secure instant messaging app, searching for it on the Internet it is possible to read the Edward Snowden’ testimony: “Use anything by Open Whisper Systems” Snowden says. The Cryptographer and Professor at Johns Hopkins […]

Pierluigi Paganini December 21, 2016
Google presents the Project Wycheproof to test crypto libraries against known attacks

Google released the Project Wycheproof, an open source tool designed to test most popular cryptographic software libraries against known attacks. Google presented the Project Wycheproof, an open source Crypto Library Testing Tool that was launched to allow development teams to discover security vulnerabilities in popular cryptographic software libraries. “Project Wycheproof tests crypto libraries against known attacks. It is […]

Pierluigi Paganini December 19, 2016
The Turkish Government has blocked the Tor access once again

The Turkish Government has applied restrictions on the Tor anonymity network, the discovery was made the Turkey Blocks internet censorship watchdog. “Our study indicates that service providers have successfully complied with a government order to ban VPN services.” reads a blog post published by the Turkey Blocks. Users in the country started reporting connectivity issues around the same time, a circumstance […]

Pierluigi Paganini December 16, 2016
More than 8,800 WordPress Plugins out of 44,705 are flawed

Security firm RIPS Technologies has analyzed 44,705 in the official WordPress plugins directory and discovered that more than 8,800 of them are flawed. Experts from the security company RIPS Technologies have conducted an interesting analysis of WordPress plugins. The researchers have analyzed 44,705 of the roughly 48,000 plugins available in the official WordPress plugins. “To do […]

Pierluigi Paganini December 12, 2016
Tor Project released an alpha version of the Sandboxed Tor Browser

Experts from the Tor project have launched an early alpha version of Sandboxed Tor Browser 0.0.2. to protect users’ anonymity. Experts from the Tor project have launched an early alpha version of Sandboxed Tor Browser 0.0.2. The Sandboxed Tor Browser aims to isolate the Tor Browser from other processes of the operating system in order to limit its ability […]

Pierluigi Paganini December 12, 2016
How much cost a StingRay? Surveillance is a profitable business

Motherboard published an interesting blog post which includes further details on the cost of StingRay phone surveillance equipment. A couple of years ago I published a post on Stingray Technology trying to explain how governments track cellular devices. A StingRay is an IMSI-catcher (International Mobile Subscriber Identity) designed and commercialized by the Harris Corporation. At the time of the […]

Pierluigi Paganini December 11, 2016
UK National Security Strategy, Cyber Security is a top priority

The UK Government published the first annual report on the implementation of the 2015 National Security Strategy. The strategy considers cyber security a top priority alongside the resurgence of state-based threats (Russia’s actions in Syria and Ukraine) and the terrorism (extremism and instability). When dealing with the impact of technology, especially cyber threats the report […]