The Security researcher David Sopas at WebSegura discovered a Reflected Filename Download vulnerability in the popular professional social network LinkedIn. He was analyzing another website when he discovered the following XHR request on Google Inspector on LinkedIn: https://www.linkedin.com/countserv/count/share?url=http://www.site_i_was_in.pt It seems a simple request to make by websites to count how many shares their site have on […]
A Critical vulnerability affects Mozilla Bugzilla bug-tracking software could be exploited to access details of non-public vulnerabilities stored in its database. The open source Bugzilla bug-tracking system is used hundreds of thousands of software organizations that track the evolution of software bugs discovered in their applications. Development team urge to upgrade Bugzilla bug tracking system to fix the […]
Despite DHS components have strengthened coordination in performing their cyber missions a recent audit made by the OIG has found several security issues. Among the missions assigned to the DHS there is the coordination of activities related to the prevention, mitigation and recovery from cyber incidents, the Department also oversees the IT security of the […]
DARPA is sustaining researchers to seek innovations in software obfuscation solutions to contrast criminals that try to reverse engineer software. DARPA (Defense Advanced Research Project Agency) and a team of researchers are turning towards new methods to overcome reverse engineering by using obfuscation to secure government and business security. The Research Team, remodeling a safe-ware program is […]
DARPA Vanishing Programmable Resources Program funded the research on a Self-destruct chip,which is capable of shattering on demand into thousands of pieces. Engineers at Xerox PARC have designed a prototype chip capable of self-destructing, it is named DUST, or Disintegration Upon Stress-Release Trigger. If t you are thinking that such kind of things can exclusive […]
Microsoft announced the signing of a Government Security Program (GSP) agreement with the NATO Communications and Information Agency. At NATO’s annual cyber conference early this week, Microsoft announced the signing of an agreement with the NATO Communications and Information Agency that aims to improve cyber security in the EU. “We see this signing as another step […]
Mandiant firm has spotted more than a dozen Cisco routers running malicious ROMMON firmware images that allow attackers to control targeted devices. A few weeks ago, CISCO issued an alert to warn enterprise customers about a spike in attacks in which hackers use valid admin credentials on IOS devices to install bogus ROMMON images, which is the bootstrap […]
A recent announcement issued by the Federal Bureau of Investigation warns customers that Internet of Things poses opportunities for cyber crime. The FBI is worried by rapid diffusion of the Internet of Things devices, according law enforcement smart objects could represent a serious threat for cyber security, and more in general for the society. Security […]
According to a report recently published by the Allianz Global the cybercrime costs UK businesses about £2.8 billion annually. According to a report recently published by the Allianz Global the cyber criminal activities costs UK businesses about £2.8 billion annually, accounting for 16 percent of gross domestic product (GDP). Cybercrime impacts on the global economy with £289.6 […]
A security expert discovered a critical flaw in the VxWorks, one of the most reliable real-time operating systems for the IoT also used by the Curiosity Rover. The Canadian security researcher Yannick Formaggio has discovered an important flaw in VxWorks which is the real-time operating system (RTOS) developed by the Wind River, an Intel’s subsidiary. VxWorks is one […]