Security

Pierluigi Paganini January 07, 2016
The Islamic State has a R&D where prepares missiles and hi-tech bombs

According to a footage obtained by Sky News, the members of the Islamic State have an R&D lab where engineers prepare sophisticated surface-to-air missiles and hi-tech bombs. According to a footage obtained by Sky News, the members of the Islamic State have sophisticated surface-to-air missiles in their arsenal. Members of the Islamic State are reportedly developing […]

Pierluigi Paganini January 07, 2016
Silent Circle promptly patched a critical flaw in the Blackphone I

Silent Circle released an update for its Blackphone 1 that fixes a critical flaw in the modem. Silent Circle has released an update for its Blackphone device that fixes several security vulnerabilities, including a flaw in its modem (CVE-2015-6841) that could have been exploited by threat actors to gain full control of the mobile device. […]

Pierluigi Paganini January 06, 2016
Security experts disclosed SCADAPASS, a list of default credentials for ICS and SCADA systems

Security experts from SCADA StrangeLove group disclosed SCADAPASS, a list of default credentials for ICS and SCADA systems. Recently I wrote about the SCADA StrangeLove research team reporting their study on the level of cyber security implemented in modern railroad systems . Now the SCADA StrangeLove group has published a list of default credentials, dubbed “SCADAPASS,” associated with industrial […]

Pierluigi Paganini January 05, 2016
Hackers cause power outage with malware in Ukraine. Is it an Information warfare act?

Hackers cause power outage with the BlackEnergy malware in Ukraine. Is it an Information warfare act? Cyber security of ICS e SCADA systems in the critical infrastructure is essential, these components are a privileged target of cyber criminals and state sponsor hackers. The most popular SCADA attack in the history is the one conducted against control systems […]

Pierluigi Paganini January 05, 2016
Black Hornet, the military nano drone small like an insect

The Prox Dynamics’ PD-100 Black Hornet 2 is a tiny drone having the dimension of a flying insect and a lot of advanced features. Drones are privileged instruments of surveillance, we read about vehicles equipped with IR cameras or devices to spy on mobile devices. These vehicles are used by armies, intelligence and law enforcement agencies during their […]

Pierluigi Paganini January 05, 2016
Samsung presented GAIA, a security solution for Smart TVs

Samsung Electronics has GAIA, a powerful and comprehensive three-layer security solution for protection of Tizen-based Smart TVs. Security experts have no doubts, IoT devices will be a privileged target for hackers, for this reason, security firm are designing solutions to mitigate cyber attacks against connected smart objects.Samsung is one of the company that is more […]

Pierluigi Paganini January 04, 2016
Discovered a new DB containing more than 56 million records of US Voters

A second misconfigured database has been discovered by Chris Vickery containing data of US voters, including 19 million profiles with private information on religion, gun ownership and more. A couple of weeks ago Salted Hash reported on a sensational discovery made by the security expert Chris Vickery who found a misconfigured archive containing the personal […]

Pierluigi Paganini January 04, 2016
BlackEnergy targets Ukrainian news media and electric industry

Security experts at ESET firm provided details of the new campaign based on the BlackEnergy Trojan that targeted Ukrainian news media and electric industry in 2015. A new wave of malware-based attacks is targeting media outlets and energy companies in Ukraines, the attackers rely on malicious code that is able to wipe hard drives of […]

Pierluigi Paganini January 04, 2016
Mac OS X is the software with most vulnerabilities in 2015

According to data provided by the CVE Details Apple Mac OS X is the software with the highest number of vulnerabilities in 2015. Which is the software with the greatest number of publicly disclosed vulnerabilities in 2015? You will be surprised to know that the software with the major number of vulnerabilities is the Apple […]

Pierluigi Paganini January 03, 2016
@FFD8FFDB Twitter bot spies on poorly configured cameras

@FFD8FFDB is a Twitter bot that spies on poorly configured cameras tweeting the images captured by the connected devices. There is an air of mystery when you first notice @FFD8FFDB. However, the next thing you will see is that really gets on to you. There is a strange Twitter account, @FFD8FFDB, that every few minute tweets pictures taken […]