Security

Pierluigi Paganini July 28, 2015
NSA will lose access to its surveillance metadata in Nov. 29

Metadata acquired due to the NSA surveillance programs was ruled illegal by a court in May 2015. The NSA will lose access to its metadata in Nov. 29. According to the Office of the Director of National Intelligence (ODNI), the NSA will destroy millions of US phone records collected during its investigation. The process will […]

Pierluigi Paganini July 28, 2015
UK – Parliament computers accessed 20,000 times a month porn sites

Bad habits are hard to eradicate, according to a post published by The Telegraph, porn sites accessed 20,000 times a month on British parliament computers. The news could appear disconcerting, computers used by MPs, peers and staff tried to access restricted porn sites, the Telegraph reported almost 250,000 attempts to visit porn websites were made […]

Pierluigi Paganini July 27, 2015
Drone Firing Semi-Automatic Handgun, what’s next?

While a video of a drone firing a semi-automatic handgun is circulating on the internet, security experts demand a strict law in the use of UAVs. I decided to present you this case to raise once again, my concerns on the uncontrolled and the unregulated diffusion of drones. Unmanned aerial vehicles (UAVs) are a powerful instrument […]

Pierluigi Paganini July 26, 2015
Security Affairs newsletter Round 19 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Russian APT launched a new phishing campaign on the Pentagon Dead NIS agent left note denying spying on SK population Microsoft to spoofed Skype users: Change your account passwords […]

Pierluigi Paganini July 26, 2015
Anonymous’s team GhostSec thwarts Isis terror plots

Anonymous affiliate GhostSec has supported US law enforcement and Intelligence agencies in thwarting Isis terror plots in New York and Tunisia. The popular Anonymous affiliate GhostSec has provided useful information on preventing terrorist attacks on New York and Tunisia planned by the Islamic State (Isis), according to a counterterrorism expert. According to the Internation Business Times, Michael Smith, an adviser to […]

Pierluigi Paganini July 26, 2015
HORNET, the High-Speed Tor-Like encrypted anonymous network

A group of six academics has developed Hornet, a new high-speed anonymity network that promises to be a valid alternative to the popular Tor network. Hornet allows for anonymous web surfing protecting the user’s privacy. The principal advantage HORNET has respect other anonymizing networks like Tor, is the speed. The Hornet is able to manage anonymous traffic […]

Pierluigi Paganini July 25, 2015
Chrysler Recalls 1.4 Million Vehicles After Jeep Cherokee PoC Hack

Fiat Chrysler has recalled 1.4 million vehicles following security researchers hacked a Jeep Cherokee remotely by exploiting a vulnerability in its systems. One of the arguments most debated in the hacking and security community this week is the recent hack of a Fiat Chrysler Jeep. The security experts Chris Valasek and Charlie Miller have demonstrated […]

Pierluigi Paganini July 25, 2015
All Smartwatches on the market are vulnerable to attacks

A study conducted by HP’s Fortify on security features implemented by Smartwatches revealed that not even a single device found to be 100 percent safe. Today we talk about a great passion of mine, watches. Let me tell you that I’m not attracted by Smartwatches, I consider watches and their gears a work of art […]

Pierluigi Paganini July 24, 2015
Exploit acquisition program terminated by Netragard

Netragard has shut down its exploit acquisition program, as a result of the clamorous data breach that the Italian firm HackingTeam has suffered. In this article we will go through an issue with a company that buys and sells exploits (Netragard) and the steps it was forced to take since one of their clients was […]

Pierluigi Paganini July 23, 2015
OpenSSH Flaw exposes servers to brute-force attacks

A new critical vulnerability was discovered in the widely used OpenSSH software, hackers exploiting this flaw can run brute-force attacks against servers. A new critical vulnerability was discovered in the widely used OpenSSH software, hackers exploiting this flaw can run brute-force attacks against server performing thousands of authentication requests remotely.  The vulnerability affects the latest version […]