Security

Pierluigi Paganini January 29, 2015
Spam campaign relies on macros embedded in empty Word documents

Experts at Bitdefender have discovered a spam campaign that tricks antispam filters by relying on macros in Empty Word Documents. Security experts at BitDefender observed a new tactic adopted by spammers that rely on emails with an empty Word document in the attachment to bypass anti-spam filters. The social engineering strategy adopted by spammers to lure victims into […]

Pierluigi Paganini January 28, 2015
Java poses the biggest security risks to PCs in US

According to a new series of reports published by Secunia firm, Oracle Java poses the biggest security risks to Desktop machines in the US. According to the a new report published by Secunia security vendor, Oracle Java software represents the principal source of problems for private US desktops, followed by Apple Quicktime 7.x. Oracle Java is […]

Pierluigi Paganini January 28, 2015
Ghost Remote Code Execution Vulnerability scares the Linux community

The Linux GNU C Library (glibc) versions prior to 2.18 are affected by the GHOST remote code execution vulnerability present in the ‘gethostbyname’ function. A new critical vulnerability is threatening the Linux community, the flaw affects the glibc GNU C library. The vulnerability is present in all Linux systems dating back to 2000 and could […]

Pierluigi Paganini January 27, 2015
Reading the ENISA Threat Landscape 2014 report

The European Union Agency for Network and Information Security has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.” The European Union Agency for Network and Information Security (ENISA) has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.” This ENISA Threat Landscape 2014 report (ETL 2014) was prepared […]

Pierluigi Paganini January 25, 2015
Adobe issued the update to fix CVE-2015-0311 zero day

Adobe released a security update that fixes also the zero-day vulnerability CVE-2015-0311 discovered by Kafeine in the last release of Angler exploit kit. The French security expert Kafeine has recently discovered an unpatched vulnerability (0day) in Flash Player is being exploited by Angler Exploit Kit. The new variant of the Angler exploit kit that exploit […]

Pierluigi Paganini January 24, 2015
SplashData published the list of Worst passwords of 2014

SplashData has published its annual report on the used of passwords that includes the list of the Worst passwords of 2014. Here we are to analyze the annual study published by SplashData, titled “123456” Maintains the Top Spot on SplashData’s Annual “Worst Passwords” List“, on the use of the passwords. Which are the most common […]

Pierluigi Paganini January 24, 2015
5800 Gas Station Tank Gauges vulnerable to cyber attacks

Rapid7 revealed that more than 5000 Automated tank gauges (ATGs) used to prevent fuel leaks at gas stations in US are vulnerable to remote cyber attacks. A recent research conducted by HD Moore of Rapid7 revealed a disconcerting truth, the Automated tank gauges (ATGs) used to prevent fuel leaks at more than 5,000 gas stations in […]

Pierluigi Paganini January 23, 2015
Google account hijacking via exploitation of XSS flaw

Security Expert Brett Buerhaus has discovered a critical flaw  on admin.google.com, which could be exploited by to Hijack an account and disable 2FA Authentication. Even the giants have their Achilles heel, the Google Apps administrator console is affected by a critical cross-site scripting (XSS) vulnerability that could be exploited by attackers to force a Google Apps admins […]

Pierluigi Paganini January 23, 2015
Google ProjectZero disclose details for three OS X 0days on Apple

Google ProjectZero disclosed the details of 3 new OS X zero-day vulnerabilities, but experts believe that they could be exploited by hackers to run attacks. If you thought the ProjectZero team worked only to find flaws in Microsoft systems you are mistaken, this time the excellence crew has discovered three more zero-day vulnerabilities affecting the Apple’s […]

Pierluigi Paganini January 22, 2015
Dotcom launches MegaChat for end-to-end encrypted audio and video communications

The entrepreneur Kim Dotcom has launched MegaChat, a new feature on Mega.nz that allows end-to-end encrypted audio and video communications. The Internet community is even more scared by continuous violation of the privacy for this reason IT community is looking new solutions that could protect users’ experience online from prying eyes. Government could be snooping in our […]