Security

Pierluigi Paganini February 17, 2016
US Judge requests Apple to unlock San Bernardino shooter’s iPhone

A US magistrate ordered Apple to help unlock San Bernardino shooter’s iPhone, be aware it is demanding a tool to bypass the security mechanism. We discussed very often of the difficulties of the law enforcement in conducting investigations when suspects used devices that make use of encryption, the case that we are going to analyze is emblematic. Apple […]

Pierluigi Paganini February 15, 2016
A flaw in CISCO Universal Small Cell allows firmware retrieval

A flaw affecting the Cisco Universal Small Cell devices allows unauthenticated remote users to retrieve devices’ firmware, so Cisco urges patching these systems. Other problems for the IT giant Cisco, the company is asking service providers using its Universal Small Cell solutions to update their systems and install a patch to solve a serious security issue. […]

Pierluigi Paganini February 12, 2016
Interview with Troels Oerting on cybersecurity in modern organizations

An interview with Troels Oerting on the cyber security in modern organizations and the importance of the role of the Chief Information Security Officer. The role of the chief information security officer (CISO) has profoundly changed over the years, from IT security management to high-level risk management. Today a CISO is a crucial figure in […]

Pierluigi Paganini February 11, 2016
Poseidon Group, a single actor behind a long series of attacks

Experts at Kaspersky Lab have linked a series of cyber attacks started in 2001 to a single threat actor called the Poseidon Group. Experts at Kaspersky Lab have identified a single threat actor behind a long-known campaign of cyberattacks financially motivated. The group of hackers identified by Kaspersky dubbed Poseidon Group attempts to extort money […]

Pierluigi Paganini February 10, 2016
SAP fixed a flaw in xMII that could open the door to nation-state hackers

SAP fixed a vulnerability affecting SAP MII can be used as a starting point of multi-stage attacks aiming to get control over plant devices and manufacturing systems. SAP fixed a critical vulnerability in its application that could be exploited by hackers, especially nation-state actors, to compromise industrial manufacturing software. SAP issued a critical software update that […]

Pierluigi Paganini February 10, 2016
Crooks are offering Apple employees up to $23,000 for their login credentials

According to former Apple employees interviewed by the Business Insider, cyber criminals are offering Apple staffers in Ireland up to $23,000 for their login details. Insiders are one of the greatest security problems for any organizations, working from the inside they can operate under the radar for a log time stealing information and sabotaging processes and infrastructures. […]

Pierluigi Paganini February 10, 2016
February 2016 Patch Tuesday – All Windows are affected by a critical flaw

Microsoft February 2016 Patch Tuesday updates include a total of 13 bulletins that resolve a total of 41 security flaws in Windows, one of them affects all supported versions. All supported versions of Windows are affected by a critical vulnerability recently fixed by Microsoft. The IT giant has released 13 security bulletins, six issues are rated as […]

Pierluigi Paganini February 10, 2016
Russian Metel group manipulated ruble-dollar exchange rate with malware

A Russian group of cyber criminals known as METEL has hacked the systems at the Kazan-based Energobank and manipulate Ruble-Dollar Exchange Rate infecting them with a malware. A Russian cyber gang has hacked the systems at the Kazan-based Energobank and manipulate Ruble-Dollar Exchange Rate infecting them with a malware. The event occurred exactly one year ago, in […]

Pierluigi Paganini February 09, 2016
Are you searching for a Facebook Hacking Tool? Be careful!

Security Experts at ESET security firm discovered a new variant of a known trojan disguised as a Facebook Hacking Tool. Security researchers at ESET have published an interesting post about a new Facebook hacking tool. I receive every week dozen emails requesting me instruction to hack Facebook accounts. The hacking tool recently discovered is not […]

Pierluigi Paganini February 09, 2016
Global and Modern Terrorism/Cyber Terrorism

In the following brief I will describe kinetic plot based modern terrorism/Cyber-terrorism and religious affiliations. Both Jihadist and Non-Jihadist, organized crime associations, data and statistics to show that Radical Muslim Terrorism is the most prominent form in America today. Modern terrorism and cyberterrorism display the use of violence and threats to intimidate or coerce, normally […]