Security

Pierluigi Paganini June 15, 2015
OPM data offered for sale on the Dark Web

Government records stolen in the recent data breach at the US OPM (Office of Personnel Management) are surfacing from the Dark Web. While security experts speculate on the possible responsible for the recent data breach at US the Office of Personnel Management (OPM) the alleged data appeared in the dark web. I have personally found it on […]

Pierluigi Paganini June 14, 2015
Researcher found Wind turbines and solar systems vulnerable worldwide

A German security researcher reported hundreds of wind turbines and solar systems wide open to easy exploits worldwide due to the lack of security by design The German researcher Maxim Rupp has discovered numerous security issues in clean energy systems, including solar lighting and wind turbines. The possible consequence of a cyber attack is the […]

Pierluigi Paganini June 14, 2015
OPM hack: White House orders the adoption of best practices

Following the recent OPM data breach the White House requested IT administrators to implement and adopt basic security measures. A few days ago news media agencies reported the data breach at the US Office of Personnel Management (OPM), according to the US Government the hack is one of the largest breaches of federal employees’ data. Data […]

Pierluigi Paganini June 11, 2015
iOS 9 improves security with Six-Digit Passcode and 2FA

Apple’s iOS 9 will force users to strengthen the device passcode and improve the two-factor authentication mechanism. Apple is revealing a series of improvement for its new iOS 9, today we have discussed the content blocker announced by Apple, and the company now announced new measures to improve the security of its devices. The iOS9 will substitute the 4-digit […]

Pierluigi Paganini June 11, 2015
Adblock in Safari may die with IOS 9 ad-killer feature

Apple announced a series of improvement for it IOS 9, including a content blocker can kill a lot of applications similar the popular AdBlock. A lot have been talks about IOS 9, and now looks like Apple included an ad-blocking feature in its OS, I would say it is a great news for its customers, […]

Pierluigi Paganini June 09, 2015
EINSTEIN defense system is more than a headache for the US government

After 4M records may have been stolen and Chinese hackers are the prime suspects, the US Govrecognizes the usefulness of the DHS EINSTEIN defense system. After 4 million records may have been stolen and Asia-based hackers are the prime suspects, the government recognizes the usefulness of the DHS EINSTEIN defense system. At this time, the […]

Pierluigi Paganini June 08, 2015
MEDIJACK – How cyber criminals violate health care systems

TrapX, a renowned security providing delivery of deception based cybersecurity  defense uncovered a security flaw in medical field dubbed as medical device hijack, or simply put MEDIJACk. The flaw can allow attackers to exploit main healthcare systems by breaking into the unpatched and outdated medical devices. Let it be Anthem hack or CareFirst BlueCross BlueShield, this year has […]

Pierluigi Paganini June 07, 2015
US Air Force located an ISIS command by analyzing a selfie

The US Air Force bombed an ISIS HeadQuarter after tracking location through the analysis of the imaged posted on social media platforms. ISIS members make professional use of social media for propaganda and to recruit new sympathizers, but intelligence agencies are trying to exploit every little mistake to track down the terrorist cells. Air Force […]

Pierluigi Paganini June 06, 2015
CNI Industry and foresight vision in security: Security by design is crucial for CIP

During the Infosecurity Europe 2015 security experts talk about a foresight vision about the Critical National Infrastructure industry (CNI). During the Infosecurity Europe 2015 –number one Information Security event, celebrated in London on 3rd June 2015, it was a special occasion to talk about a foresight vision about the Critical National Infrastructure industry (CNI). In […]

Pierluigi Paganini June 05, 2015
Harvesting clients’ information from the utility company

A security expert explained how it is possible to hack the service provided by a utility company raising serious security and privacy issues. In the most recent post of atxsec.com the owner of the blog talks about a flaw that he discovered after trying to pay his utility bill. To pay his utility bill he decided […]