Security

Pierluigi Paganini June 07, 2016
Fabrication-time Attacks and the Manchurian Chip

Boffins released a paper describing how computer processors can be programmed to give elevated privileges to hackers and run fabrication-time attacks. A team of researchers from the University of Michigan recently released a paper describing how computer processors can be programmed to give elevated privileges to hackers.  The paper titled, “A2: Analog Malicious Hardware,” describes […]

Pierluigi Paganini June 02, 2016
Lenovo Accelerator Application contains a bug that allows remote hack of your PC

A study of Duo Security revealed that Lenovo Accelerator Application support tool contains a high-risk flaw that allows remote code execution. Once again bad news for Lenovo users, the company is informing them that the Lenovo Accelerator Application contains a high-risk vulnerability that could be exploited by hackers to remotely execute code on the machine and […]

Pierluigi Paganini June 01, 2016
Iran orders media companies to store data in the country

Iran orders foreign social media and instant messaging companies to use servers in the country to store all data related to the Iranian citizens. The Iranian Government spends a significant effort for the Internet monitoring and control, its activities often lead to a concrete censorship. Last year the Government of Teheran has blocked Telegram and many other social networking companies due to […]

Pierluigi Paganini May 31, 2016
Power plant ICS threatened by an easy remotely exploitable flaw

The independent researcher Maxim Rupp reported an unpatchable flaw in the ICS Environmental Systems Corporation (ESC) 8832 Data Controller. Vulnerable SCADA and industrial control systems represent the entry point in critical infrastructure for hacking attacks. In many cases, patch management of these systems is very complex and in some specific scenarios known flaws could not be fixed for various […]

Pierluigi Paganini May 31, 2016
CVE-2016-2107 OpenSSL Flaw still affects many Alexa Top Sites

According to the security firm High-Tech Bridge many of the Alexa Top 10,000 websites are still vulnerable to the OpenSSL flaw CVE-2016-2107. The CVE-2016-2107 flaw affecting the open-source cryptographic library could be exploited to launch a man-in-the-middle attack leveraging on the ‘Padding Oracle Attack’ that can decrypt HTTPS traffic if the connection uses AES-CBC cipher and the server supports AES-NI. According […]

Pierluigi Paganini May 31, 2016
Cyber-crimes cost victims over $1 Billion according to 2015 IC3 report

Analyzing the data included in the Internet Crime Compliant Center – IC3 report 2015 recently issued by the Federal Bureau of Investigation. FBI released the Internet Crime Compliant Center – IC3 report of 2015 last week. During the last calendar year, IC3 received 288,012 complaints and 44 percent of them reported financial loss equal to […]

Pierluigi Paganini May 30, 2016
US-CERT warns MEDHOST medical app contains hard-coded credentials

The US Computer Emergency Response Team has issued a warning after the discovery a security issue the popular medical application MEDHOST PIMS (PIMS). Many security experts believe that medical industry lack of a proper security posture, despite it is a high-tech sector the vast majority of medical equipment was not designed with a security by design […]

Pierluigi Paganini May 29, 2016
Media revealed that the Russia is developing its kamikaze drones

According to the RT.com media agency the Russia is developing new kamikaze drones to use in surgical military operations. When you think about possible military uses of drones, surveillance and air strikes are the principal activities that we can imagine. According to the Russian media, the Russia is developing a kamikaze drone that could be used […]

Pierluigi Paganini May 27, 2016
How does ISO 27001 work?

This article is an excerpt from the book Secure & Simple: A Small-Business Guide to Implementing ISO 27001 On Your Own. Click here to see what’s included in the book
 When speaking with someone new to ISO 27001, very often I encounter the same problem: this person thinks the standard will describe in detail everything […]

Pierluigi Paganini May 26, 2016
Dozens of VISA HTTPS-protected sites vulnerable to Forbidden attack

  Dozens of HTTPS-protected websites belonging to Visa are vulnerable to Forbidden Attack, nearly 70,000 servers are at risk. A new attack technique dubbed ‘Forbidden attack’ expose dozens of HTTPS Visa sites vulnerable to cyber attacks and roughly another 70,000 servers are at risk. A group of international researchers (Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, […]