Security

Pierluigi Paganini January 04, 2016
Mac OS X is the software with most vulnerabilities in 2015

According to data provided by the CVE Details Apple Mac OS X is the software with the highest number of vulnerabilities in 2015. Which is the software with the greatest number of publicly disclosed vulnerabilities in 2015? You will be surprised to know that the software with the major number of vulnerabilities is the Apple […]

Pierluigi Paganini January 03, 2016
@FFD8FFDB Twitter bot spies on poorly configured cameras

@FFD8FFDB is a Twitter bot that spies on poorly configured cameras tweeting the images captured by the connected devices. There is an air of mystery when you first notice @FFD8FFDB. However, the next thing you will see is that really gets on to you. There is a strange Twitter account, @FFD8FFDB, that every few minute tweets pictures taken […]

Pierluigi Paganini January 02, 2016
Modern railroad systems vulnerable to cyber attacks

A team of researchers has evaluated the level of cyber security implemented in modern railroad systems and discovered several vulnerabilities. A team of experts composed of Sergey Gordeychik, Alexander Timorin and Gleb Gritsai of SCADA StrangeLove, recently disclosed their findings at the 32nd Chaos Communication Congress (32C3) in Germany. Railroads belong to the critical infrastructure of a […]

Pierluigi Paganini December 31, 2015
Data of 34,000 Steam users exposed due to buggy caching configuration

Valve company publicly confirmed that Steam deployed a buggy caching configuration to mitigate a DDoS attack which exposed Steam users personal information. Still problems for the Steam gaming platform, details of 34,000 Steam users have been exposed during a DDoS attack. Last week, as a result of a configuration change, a security issue allowed some Steam […]

Pierluigi Paganini December 31, 2015
Google will switch from Java APIs to OpenJDK

Google confirms that the next Android versions will use Oracle’s open-source OpenJDK instead the Java APIs, a strategic choice. Google is leaving Java application programming interfaces (APIs) in future versions of its mobile operating system Android. The company is planning to adopt as an alternative an open source solution. What is this OpenJDK? It is an […]

Pierluigi Paganini December 30, 2015
DHS: Drug Traffickers are hacking surveillance drones on the border

The U.S. Department of Homeland Security and local law enforcement confirmed that Drug Traffickers are hacking surveillance drones on the border. Small drones are another powerful tool used by the US Department of Homeland Security to monitor its borders, but drug traffickers already adopting countermeasures. In order to avoid surveillance, drug traffickers are hacking US […]

Pierluigi Paganini December 30, 2015
A software bug caused the early release of 3,200 US prisoners

The US Department of Corrections discovered a long-standing software bug that resulted in the early release of prisoners. This news is disconcerting and demonstrates the importance to carefiìully consider the technology in our lives. The Washington State Department of Corrections (DoC) launched an investigation after it early released 3,200 prisoners over the course of 13 years. It […]

Pierluigi Paganini December 29, 2015
A new emergency patch for Adobe Flash Zero-Day, update your system!

Adobe has released security patches for Adobe Flash Player to fix critical vulnerabilities that could be exploited to take control of the affected system. Adobe released an emergency patch for Flash Zero-Day (CVE-2015-8651) that is currently being exploited in targeted attacks. The out-of-band security update issued on Monday fix a number of security vulnerabilities that could be exploited […]

Pierluigi Paganini December 27, 2015
InterApp, the device that can hack any Smartphone

The Tel Aviv-based Rayzone Group is offering for sale a gadget called InterApp that can intercept and exfiltrate information from nearby smartphones. InterApp is a device designed by the Israeli Rayzone Group that can spy on any smartphone. “InterApp system enables to get intimate information of any phone user, which is in the system’s ,proximity. The collected […]

Pierluigi Paganini December 26, 2015
Victims of the Gomasom Ransomware can now decrypt their files for free

Fabian Wosar, security researcher at Emsisoft, created a tool for decrypting files locked by the Gomasom Ransomware. Ransomware are the most threatening cyber threats for end-users, but today I have a good news for victims of the Gomasom ransomware, victims can rescue their locked files. The news was spread by the security researcher Fabian Wosar that developed a […]