Security

Pierluigi Paganini November 03, 2015
More than 100 Million Android users at risk due to the Baidu Moplus SDK

A vulnerability known as Wormhole affects the Baidu Moplus SDK and potentially exposes more than 100 Million users to cyber attacks. The Moplus software development kit (SDK) distributed by the Chinese Search Engine Baidu includes a functionality that can be exploited to gain access to the user’s device. The backdoor-like feature potentially exposes more than 100 Million Android users to cyber attacks. […]

Pierluigi Paganini November 02, 2015
CISA Passes Senate, criticism about privacy and security

The CISA cyber security bill passes US Senate despite tech giants, privacy advocates, and civil liberties groups express their disappointment. The US Senate voted overwhelmingly to pass a version of the Cybersecurity Information Sharing Act (CISA), a bill that has been debated for a long because it will authorize government pervasive monitoring of citizens. Many politicians, tech […]

Pierluigi Paganini November 01, 2015
Allegations of ISIS involvement in Flight 7K9268 crash not reliable

The ISIS claims to have downed the Flight 7K9268 and it has released a terrific video purporting to show the final instants of aircraft. While the experts are investigating into the causes of the Russian Flight 7K9268 crash over the Sinai Peninsula, civil aviation experts exclude that the plane was downed by ISIS militants. According to security […]

Pierluigi Paganini October 31, 2015
The surveillance firm Hacking Team is back stronger than before

Motherboard has obtained a non-public email sent by the Hacking Team CEO to its customers that announce a new generation of hacking tools. Hacking Team is the popular surveillance company that suffered a serious data breach this year. More than 400 GB of its sensitive data were exfiltrated from the Italian company, including internal emails, zero-day exploits, surveillance […]

Pierluigi Paganini October 31, 2015
How CoinVault or Bitcryptor victims could try to recover their files

Victims of CoinVault ransomware can now rely on a new set of encryption keys added to the free CoinVault Ransomware Decryptor tool to recover their files. Every day, dozens of users ask me how to decrypt their data locked by various ransomware such as CoinVault or Bitcryptor? Now I have a good news for them, […]

Pierluigi Paganini October 30, 2015
Tor Messenger is arrived, the secure Tor instant messaging

Today the TorProject has released a new beta version of Tor Messenger, based on Instantbird, an instant messaging client developed in the Mozilla community. It’s official, the Tor Project has launched the first beta version of Tor Messenger, an open source and Encrypted instant messaging client that relies on Tor network. The messenger has been […]

Pierluigi Paganini October 29, 2015
Shockwave player flaw exposes 450 million users at risk of hack

Adobe has released a critical update to fix a flaw in the Shockwave player that could be exploited to compromise hundreds of millions of machines. Adobe has released a critical update to fix a vulnerability in the Shockwave player (CVE-2015-7649) that could be exploited by threat actors to compromise hundreds of millions of machines. The […]

Pierluigi Paganini October 29, 2015
Iranian Hackers focus their efforts in Android RATs

A research published by RecordedFuture demonstrates that the interest in Android RATs of Iranian Hackers is rising, DroidJack and AndroRAT are most popular. According to the threat researcher Rodrigo Bijou (@rodrigobijou), Iranian malware authors are focusing their efforts on mobile RATs, in particular, malicious codes designed to compromise Android devices. The security experts confirmed that […]

Pierluigi Paganini October 28, 2015
The US DoD still uses SHA-1 signed certificates for use by military agencies

The United States Department of Defense is still issuing SHA-1 signed certificates for its military agencies, despite they are considered insecure. Today I have published a blog post on the Army Vulnerability Response Program (AVRP), a sort of bug bounty program specific for the US military environment. The idea is to incentive  the ethical disclosure of vulnerabilities […]

Pierluigi Paganini October 28, 2015
US Army Experts Call for military bug bounty program AVRP

US Army Military experts urge the establishment of an Army Vulnerability Response Program (AVRP),  a sort of military bug bounty program. What happen when bug hunters have to work with high sensitive environment? An interesting post published by the Cyber Defense Review raises the discussion about the was way to handle vulnerabilities in the information security infrastructure of the […]