Security

Pierluigi Paganini January 05, 2016
Black Hornet, the military nano drone small like an insect

The Prox Dynamics’ PD-100 Black Hornet 2 is a tiny drone having the dimension of a flying insect and a lot of advanced features. Drones are privileged instruments of surveillance, we read about vehicles equipped with IR cameras or devices to spy on mobile devices. These vehicles are used by armies, intelligence and law enforcement agencies during their […]

Pierluigi Paganini January 05, 2016
Samsung presented GAIA, a security solution for Smart TVs

Samsung Electronics has GAIA, a powerful and comprehensive three-layer security solution for protection of Tizen-based Smart TVs. Security experts have no doubts, IoT devices will be a privileged target for hackers, for this reason, security firm are designing solutions to mitigate cyber attacks against connected smart objects.Samsung is one of the company that is more […]

Pierluigi Paganini January 04, 2016
Discovered a new DB containing more than 56 million records of US Voters

A second misconfigured database has been discovered by Chris Vickery containing data of US voters, including 19 million profiles with private information on religion, gun ownership and more. A couple of weeks ago Salted Hash reported on a sensational discovery made by the security expert Chris Vickery who found a misconfigured archive containing the personal […]

Pierluigi Paganini January 04, 2016
BlackEnergy targets Ukrainian news media and electric industry

Security experts at ESET firm provided details of the new campaign based on the BlackEnergy Trojan that targeted Ukrainian news media and electric industry in 2015. A new wave of malware-based attacks is targeting media outlets and energy companies in Ukraines, the attackers rely on malicious code that is able to wipe hard drives of […]

Pierluigi Paganini January 04, 2016
Mac OS X is the software with most vulnerabilities in 2015

According to data provided by the CVE Details Apple Mac OS X is the software with the highest number of vulnerabilities in 2015. Which is the software with the greatest number of publicly disclosed vulnerabilities in 2015? You will be surprised to know that the software with the major number of vulnerabilities is the Apple […]

Pierluigi Paganini January 03, 2016
@FFD8FFDB Twitter bot spies on poorly configured cameras

@FFD8FFDB is a Twitter bot that spies on poorly configured cameras tweeting the images captured by the connected devices. There is an air of mystery when you first notice @FFD8FFDB. However, the next thing you will see is that really gets on to you. There is a strange Twitter account, @FFD8FFDB, that every few minute tweets pictures taken […]

Pierluigi Paganini January 02, 2016
Modern railroad systems vulnerable to cyber attacks

A team of researchers has evaluated the level of cyber security implemented in modern railroad systems and discovered several vulnerabilities. A team of experts composed of Sergey Gordeychik, Alexander Timorin and Gleb Gritsai of SCADA StrangeLove, recently disclosed their findings at the 32nd Chaos Communication Congress (32C3) in Germany. Railroads belong to the critical infrastructure of a […]

Pierluigi Paganini December 31, 2015
Data of 34,000 Steam users exposed due to buggy caching configuration

Valve company publicly confirmed that Steam deployed a buggy caching configuration to mitigate a DDoS attack which exposed Steam users personal information. Still problems for the Steam gaming platform, details of 34,000 Steam users have been exposed during a DDoS attack. Last week, as a result of a configuration change, a security issue allowed some Steam […]

Pierluigi Paganini December 31, 2015
Google will switch from Java APIs to OpenJDK

Google confirms that the next Android versions will use Oracle’s open-source OpenJDK instead the Java APIs, a strategic choice. Google is leaving Java application programming interfaces (APIs) in future versions of its mobile operating system Android. The company is planning to adopt as an alternative an open source solution. What is this OpenJDK? It is an […]

Pierluigi Paganini December 30, 2015
DHS: Drug Traffickers are hacking surveillance drones on the border

The U.S. Department of Homeland Security and local law enforcement confirmed that Drug Traffickers are hacking surveillance drones on the border. Small drones are another powerful tool used by the US Department of Homeland Security to monitor its borders, but drug traffickers already adopting countermeasures. In order to avoid surveillance, drug traffickers are hacking US […]