Security

Pierluigi Paganini March 01, 2016
Two Years to General Data Protection Regulation Compliance

The General Data Protection Regulation (GDPR) governs the use and privacy of EU citizens’ data and the Data Protection Directive governs the use of EU citizens’ data by law enforcement. EU Data Protection Reform was put forward in January 2012 by the European Commission to make Europe fit for the digital age. At the last […]

Pierluigi Paganini March 01, 2016
European police corps arrested operators behind darknets offering illegal products and services

A coordinated operation of law enforcement agencies in 7 countries raided operators of darknets trading in illegal products and services. A joint effort of law enforcement agencies in seven European countries (Germany, Bosnia, Switzerland, France, the Netherlands, Lithuania and Russia) allowed authorities to identify and arrest operators of darknet online platforms trading in illegal products […]

Pierluigi Paganini February 29, 2016
Using the Microsoft EMET security tool to hack itself

The security researchers at FireEye Abdulellah Alsaheel and Raghav Pande have found a way to exploit Microsoft EMET (Enhanced Mitigation Experience Toolkit) to hack itself. The security researchers at FireEye security Abdulellah Alsaheel and Raghav Pande have found a way to exploit the Microsoft security tool Enhanced Mitigation Experience Toolkit to hack itself. The Enhanced Mitigation […]

Pierluigi Paganini February 29, 2016
Chinese ISPs are redirecting users legitimate traffic to malicious sites/ads

Chinese ISPs (internet service providers) are redirecting users legitimate traffic to malicious websites serving malware and ads. China is know to be not very “ortodox” when talking about freedom on the internet, over the time, it developed numerous projects to monitor users’ activity. The Great Firewall Now three Israeli researchers uncovered that Chinese ISPs (China Telecom […]

Pierluigi Paganini February 29, 2016
A journalist has been hacked on a plane while writing an Apple-FBI story

The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises the discussion on privacy. Experts in the aviation industry are spending a significant effort in the attempt of improving cyber security. The news that I’m going to tell you has something of incredible. The American journalist […]

Pierluigi Paganini February 28, 2016
A DHS report confirms the use of BlackEnergy in the Ukrainian outage, still unknown its role

A report issued by the DHS CERT confirms that the outage in Ukraine was caused by a well-coordinated attack still unclear the BlackEnergy role. In December, a major outage hit a region in Ukraine, more than 225,000 customers were affected by the interruption of the electricity. Security experts speculate the involvement of Russian nation-state actors that have used the BlackEnergy to […]

Pierluigi Paganini February 27, 2016
Gemalto Breach Level Index report 2015, what are hackers looking for?

2015 Gemalto Breach Level Index report confirmed the increased interest of threat actors in Government and healthcare data. As per the security firm Gemalto, Government and healthcare have overwhelmed the retail area as most-focused for information breaks. An aggregate of 1,673 information ruptures prompted 707 million information records being traded off worldwide amid 2015, as […]

Pierluigi Paganini February 26, 2016
Discover how many ways there were to hack your Apple TV

Apple has patched more than 60 vulnerabilities affecting the Apple TV, including flaws that can lead to arbitrary code execution and information disclosure. IoT devices are enlarging our attack surface, we are surrounded by devices that manage a huge quantity of information and that could be abused by hackers. Apple has patched more than 60 […]

Pierluigi Paganini February 26, 2016
Cisco fixes Command Injection vulnerability in CISCO ACE 4710 products

Cisco has released security updates for the products CISCO ACE 4710 appliance to fix a high severity command injection vulnerability. This week CISCO published a security advisory related a Command Injection Vulnerability (CVE-2016-1297) affecting its product Cisco ACE 4710 Application Control Engine Command. The vulnerability was reported to the company by Jan Kadijk, an expert at Warpnet BV. The […]

Pierluigi Paganini February 26, 2016
The DoD funded the Carnegie Mellon University’s research on Tor Hacking

A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor hacking. In November 2015, the researchers at the Tor Project publicly accused the FBI of paying the experts at the Carnegie Mellon University to deanonymize Tor users. The experts at the Tor Project collected information about the […]