Security

Pierluigi Paganini January 13, 2015
FBI Has Been Digging Deeper in Surveillance over the Past Few Years – No Warrant Required

New York Times have managed to lead to the declassification of a report, highlighting the participation of the FBI to a warrantless surveillance program terminated in 2012. Links to the Prism surveillance program and leaks from Edward J Snowden point at the FBI being actively present in breaches of privacy. FBI has been linked to […]

Pierluigi Paganini January 12, 2015
Energy Sector – Presented the Cybersecurity Framework Implementation Guidance

The US Energy Department issued the guidance “Energy Sector Cybersecurity Framework Implementation Guidance” for organizations operating in the industry. The Energy industry is constantly under attack, the number of hacking campaigns that are targeting the sector is increasing exponentially. Energy companies and utilities have to adopt a proper cyber security posture in order to mitigate the […]

Pierluigi Paganini January 09, 2015
ASUS router firmware affected by root command execution flaw

Several ASUS routers include a service that listens on UDP broadcast port 9999 on the LAN interface and contains an unauthenticated command execution flaw. The Security researchers Joshua Drake discovered a serious vulnerability in the firmware running on several ASUS routers that allows an unauthenticated attacker to run arbitrary command on the device. According to the expert, […]

Pierluigi Paganini January 08, 2015
New Emotet spam campaign targets German users

Security experts at Microsoft detected a new variant in the Win32/Emotet family which is targeting German users with a new spam email campaign. Researchers from Microsoft have uncovered a new criminal campaign is targeting German users with a new variant of a sophisticated banking malware, Trojan:Win32/Emotet.C. The attackers are running Spam email campaign in Germany to serve a […]

Pierluigi Paganini January 07, 2015
Insider Theft affects a tenth of Morgan Stanley Wealth Management Clients

Insider theft at Morgan Stanley affected nearly the ten percent of the company’s wealth management clients, the company officially confirmed the incident. The financial services company Morgan Stanley has confirmed a partial client data leak, the incident was confirmed by the firm in a statement published on its website. Morgan Stanley reported that an employee posted […]

Pierluigi Paganini January 07, 2015
CERT CC warns about critical flaws in UEFI implementations

The Carnegie Mellon University CERT/CC warned about the presence of serious vulnerabilities in the Unified Extensible Firmware Interface (UEFI). The CERT/CC has issued three different advisories for security flaws identified in the Unified Extensible Firmware Interface (UEFI). The Unified Extensible Firmware Interface (UEFI) (pronounced as an initialism U-E-F-I or like “unify” without the n) is a specification that defines a software interface between an operating […]

Pierluigi Paganini January 03, 2015
Google discloses a Zero-Day Windows 8.1 flaw

Google Project Zero team has disclosed the details of an unpatched flaw affecting Windows 8.1 systems and reported to Microsoft in September. The experts at the Google Project Zero team have ethically disclosed the details of an unpatched Windows 8.1 vulnerability reported to Microsoft in September. The team has waited for 90 days before publicly disclose the […]

Pierluigi Paganini December 29, 2014
Gmail service has been blocked in China

Gmail has been blocked in China, experts speculated that the Chinese Government used the China’s Great Firewall to interfere with the email service. Bad news for Chinese Gmail users, the popular email service offered by Google was blocked in China. Anti-censorship and privacy advocates speculated on filtering activity operated by the national Great Firewall system. According to the freedom […]

Pierluigi Paganini December 29, 2014
SS7 Attacks and Potential Breaches in Telecommunication Leading to Chaos.The Ukraine case.

Recent revelations have made it clear that SS7 breaches can occur, thanks to the vulnerabilities of such a set of protocols for telecom. Hackers can take advantage of these threats, like they have done in the past, as German researchers warn. The example of Ukraine and Russia highlights the danger crawling towards countries wishing to […]

Pierluigi Paganini December 28, 2014
Lavish Cars with Wireless Technology and Dashboards Can Be Hacked

Hackers have now got the knowledge and ability to track down dashboard technology and intercept crucial info from cars and especially luxury ones. It has been reported that cars wit fitted wireless technology can be hacked by experts and cause grave problems to their owners. Hackers have now got the knowledge and ability to track […]