Security

Pierluigi Paganini September 01, 2015
Agora Black Market fearing Tor vulnerabilities goes down

Agora black marketplace announced Tuesday evening that it will go temporary offline fearing the exploitation of the Tor flaws recently discovered. Operators of principal black markets are concerned about the real level of anonymity offered by the Tor network after the discovery of critical vulnerabilities affecting the anonymizing system. The administrators of the Agora black market, one […]

Pierluigi Paganini August 31, 2015
Car Hackers Charlie Miller and Chris Valasek will work at Uber

Charlie Miller and Chris Valasek, the famous car hackers who recently demonstrated that some Fiat Chrysler cars can be remotely hijacked, have been hired by ridesharing giant Uber. The popular hackers Charlie Miller and Chris Valasek who recently hackers a Fiat connected car have announced that they have been hired by the Uber Company. Miller and Valasek […]

Pierluigi Paganini August 31, 2015
KeyRaider: iOS Malware targets over 225,000 Apple accounts

PaloAlto and with WeipTech have identified 92 samples of a new iOS malware family in the wild dubbed KeyRaider that compromised over 225,000 Apple accounts. Palo Alto networks announced recently that a new iOS malware called KeyRaider allowed crooks to take over more than 225.000 apple accounts on jailbroken iOS devices. KeyRaider allows the attackers […]

Pierluigi Paganini August 30, 2015
Alleged Russian hackers behind the EFF Spear phishing Scam

The experts at EFF organization speculate that Russian State-sponsored hackers belonging the APT 28 group have managed the last EFF Spear phishing Scam. Attackers, alleged to belong to a Russian state-sponsored APT registered a bogus Electronic Frontier Foundation domain earlier this month. The hackers used the name brand of popular privacy watchdog in an attempt to trick […]

Pierluigi Paganini August 30, 2015
Report: How Iranian hackers attempt to takeover your Gmail

According to a report published by the Citizen Lab Iranian hackers have elaborated a sophisticated phishing scheme to takeover Gmail accounts. According to a report published by the Citizen Lab at the University of Toronto’s Munk School of Global Affairs, Iranian hackers have elaborated a sophisticated phishing scheme to circumvent security measures that defend Gmail […]

Pierluigi Paganini August 30, 2015
How Employees Become Pawns for Hackers

Employees are the greatest security risks, especially since they are prone to be used as pawns for hackers. That’s why they are vulnerable to attacks. Mobile technology has changed the landscape of business these days. It has enabled employees to set up virtual offices, have more work flexibility, and even extend working on their own […]

Pierluigi Paganini August 30, 2015
Point-of-Sale Payment Security

In this post the author Scott Thompson explores the basics of Point-of-Sale Security analyzing threats and possible solutions. Basics of Point-of-Sale Security In late 2013, at the height of the holiday shopping season, Target Corporation’s point-of-sale payment network was breached, and over 70 million customers had their card payment information stolen, including this author, creating […]

Pierluigi Paganini August 29, 2015
Google Chrome will freeze Flash content and ads from Sept 1st

Starting from September 1st, 2015, Google will disable Flash’s ability to auto-play in its Chrome browser. What will change for advertisers? Google is going to disable Flash’s ability to auto-play in Chrome, the change will be introduced starting from September 1, 2015. Since this date, non-important Flash files will need explicit user’active to play in the browser. […]

Pierluigi Paganini August 27, 2015
The US government created new rules for Cloud Providers

A new set of rules was created by the Department of Defense (DoD) for Cloud Providers to report security holes when dealing with US government data. A new set of rules was created by the Department of Defense (DoD) of the US government for how the cloud providers should report the security issues that involve […]

Pierluigi Paganini August 27, 2015
CERT warns of hard-coded credentials in home routers

DSL home routers from a number of vendors contain hard-coded credentials that could allow a hacker to hijack the network devices via telnet services. A bunch of home gateway vendors, presumably sourcing their firmware from the same place, can be hijacked using depressingly common hard-coded logins. Experts from the Carnegie-Mellon CERT discovered that a number of home […]