Security

Pierluigi Paganini June 07, 2015
US Air Force located an ISIS command by analyzing a selfie

The US Air Force bombed an ISIS HeadQuarter after tracking location through the analysis of the imaged posted on social media platforms. ISIS members make professional use of social media for propaganda and to recruit new sympathizers, but intelligence agencies are trying to exploit every little mistake to track down the terrorist cells. Air Force […]

Pierluigi Paganini June 06, 2015
CNI Industry and foresight vision in security: Security by design is crucial for CIP

During the Infosecurity Europe 2015 security experts talk about a foresight vision about the Critical National Infrastructure industry (CNI). During the Infosecurity Europe 2015 –number one Information Security event, celebrated in London on 3rd June 2015, it was a special occasion to talk about a foresight vision about the Critical National Infrastructure industry (CNI). In […]

Pierluigi Paganini June 05, 2015
Harvesting clients’ information from the utility company

A security expert explained how it is possible to hack the service provided by a utility company raising serious security and privacy issues. In the most recent post of atxsec.com the owner of the blog talks about a flaw that he discovered after trying to pay his utility bill. To pay his utility bill he decided […]

Pierluigi Paganini June 04, 2015
Thamar Reservoir – Iranian hackers target entities in Middle East

Security experts at ClearSky have published a report on the a cyber espionage campaign dubbed Thamar Reservoir that is targeting entities in the Middle East. Security experts at ClearSky have uncovered a cyber espionage campaign dubbed Thamar Reservoir due to the name of its target Thamar E. Gindin. The investigation led the experts to date the Thamar Reservoir […]

Pierluigi Paganini June 03, 2015
US Schools use social media monitoring platform to protect students

Several US schools are using social media monitoring platform to watch students and their online activities in order to prevent risky situations. A number of US schools are using social media monitoring software to watch students and their online activities. According to the news website Click Orlando, the institutes have bought access to sophisticated social media monitoring […]

Pierluigi Paganini June 03, 2015
Compromised SSH keys used to access popular GitHub repositories

Security experts Ben Cox explained that the official Github repositories of the UK Government, Spotify, and Python were accessed using compromised SSH keys. Ben Cox, engineer at CloudFlare revealed that the official Github repositories of the UK Government, Spotify, and Python were accessed by using legitimate SSH keys. It seems that the keys were compromised […]

Pierluigi Paganini June 02, 2015
Facebook positive step to use PGP for sending encrypted notification emails

Facebook users can add PGP keys to their profiles in order to receive “end-to-end” encrypted notification emails sent from Facebook. On June 1, 2015, Facebook announced a new security feature to enhance the privacy of notification email content. Now, Facebook users are able to add PGP keys to their profiles in order to receive “end-to-end” […]

Pierluigi Paganini June 01, 2015
US financial industry moves under a rising wave of Cyberattacks and Zero-Day threats on I.R.S Tax Returns

US financial industry is under persistent attacks, the number of incidents that compromised confidentiality, integrity and availability of data are increasing. Financial industry in US maintains symptoms of persistent cyber-attacks among surprising cyber incidents and large-scale data breaches that compromised confidentiality, integrity and availability of user’s information. Several advanced hacking methods and the exploitation of zero-day flaws […]

Pierluigi Paganini May 31, 2015
Security Affairs newsletter Round 11 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. The Phantom Menace, who targeted the oil tankers? Hi-tech car thieves use ÂŁ30 jamming devices in car parks Researcher who exploits bug in Starbucks gift cards gets rebuke, not […]

Pierluigi Paganini May 31, 2015
The Importance of Operational Security and User Education

An overview of the principal issues related to the 3 general categories that security controls fall under; physical, technical, and operational controls. What is Layer 8? Layer 8 is a term utilized by information security professionals and techies in general that represents the weakest link of every organization: the users.  While an organization may be […]