Security

Pierluigi Paganini August 02, 2015
Operation Potao – hackers used a trojanized version of TrueCrypt

ESET issued a report on a cyber espionage campaign dubbed Operation Potao that relied on the diffusion of a trojanized Russian language version of TrueCrypt. Despite TrueCrypt development was mysteriously interrupted last year, the popular open-source encryption tool still represents the ideal choice for individuals that need to encrypt their data. Recently ESET published an interesting report […]

Pierluigi Paganini August 02, 2015
Microsoft Windows 10 spies on you by default

While Microsoft is offering for free it new Windows 10 OS, security experts argue that the cost for user privacy is much higher. Microsoft Windows 10 is the new operating system of the IT giant, the newborn already reached more than 14 million downloads in just two days. The experts who have already analyzed Windows 10 […]

Pierluigi Paganini August 02, 2015
Hacking Industrial Ethernet Switches to take over nuclear plants

Hackers can exploit the vulnerabilities affecting Industrial Ethernet Switches and take control over Nuclear Power Plants and other critical infrastructure. The increasing number of incidents occurred in these years demonstrated that a cyber attack could cause serious damage to industrial processes. It is enough that hackers find and exploit a simple vulnerabilities in one of […]

Pierluigi Paganini August 01, 2015
A new flaw in BIND is threatening the Internet’ core

A new vulnerability affects Bind, the open-source software that implements the Domain Name System (DNS) protocols for the Internet. BIND is used by servers for translating human-friendly domain names into IP addresses. This vulnerability could be exploited by a  lone hacker to bring down swaths of the Internet. The problem affects all the major versions […]

Pierluigi Paganini July 30, 2015
BLEkey – How to Clone RFID cards with a $10 device

Accuvant researchers will be releasing an open source piece of hardware dubbed BLEkey that can be used to circumvent these RFID card readers. Do you require to pass a card into a device to enter in your company’s office?  Most probably you are using a card based on Radio-Frequency Identification (RFID) technology to grant the […]

Pierluigi Paganini July 28, 2015
NSA will lose access to its surveillance metadata in Nov. 29

Metadata acquired due to the NSA surveillance programs was ruled illegal by a court in May 2015. The NSA will lose access to its metadata in Nov. 29. According to the Office of the Director of National Intelligence (ODNI), the NSA will destroy millions of US phone records collected during its investigation. The process will […]

Pierluigi Paganini July 28, 2015
UK – Parliament computers accessed 20,000 times a month porn sites

Bad habits are hard to eradicate, according to a post published by The Telegraph, porn sites accessed 20,000 times a month on British parliament computers. The news could appear disconcerting, computers used by MPs, peers and staff tried to access restricted porn sites, the Telegraph reported almost 250,000 attempts to visit porn websites were made […]

Pierluigi Paganini July 27, 2015
Drone Firing Semi-Automatic Handgun, what’s next?

While a video of a drone firing a semi-automatic handgun is circulating on the internet, security experts demand a strict law in the use of UAVs. I decided to present you this case to raise once again, my concerns on the uncontrolled and the unregulated diffusion of drones. Unmanned aerial vehicles (UAVs) are a powerful instrument […]

Pierluigi Paganini July 26, 2015
Security Affairs newsletter Round 19 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Russian APT launched a new phishing campaign on the Pentagon Dead NIS agent left note denying spying on SK population Microsoft to spoofed Skype users: Change your account passwords […]

Pierluigi Paganini July 26, 2015
Anonymous’s team GhostSec thwarts Isis terror plots

Anonymous affiliate GhostSec has supported US law enforcement and Intelligence agencies in thwarting Isis terror plots in New York and Tunisia. The popular Anonymous affiliate GhostSec has provided useful information on preventing terrorist attacks on New York and Tunisia planned by the Islamic State (Isis), according to a counterterrorism expert. According to the Internation Business Times, Michael Smith, an adviser to […]