Security

Pierluigi Paganini May 29, 2015
Stegosploit hides malicious code in images, this is the future of online attacks

Stegosploit is the technique developed by the security researcher Saumil Shah that allows an attacker to embed executable JavaScript code within an image. The security researcher Saumil Shah from Net Square security has presented at Hack In The Box conference in Amsterdam his Stegosploit project which allows an attacker to embed executable JavaScript code within an […]

Pierluigi Paganini May 28, 2015
Mandrake, NSA identifies users based on how they type on their devices

According to a senior fellow for Lockheed IT, the National Security Agency has tested the use of smartphone-swipe recognition technology dubbed Mandrake. The NSA has developed a new technology, dubbed “Mandrake“, that can identify users from the way they swipe strokes and text on a smartphone screen. The news was reported by officials with Lockheed […]

Pierluigi Paganini May 28, 2015
Ponemon Institute – Cost of data breach reaches record levels

The Ponemon Institute’s 2015 Global Cost of Data Breach Study reveals that the average cost of a data breach has reached record levels. Every year, I propose you the findings of the report published by the Ponemon Institute related the evolution of the cost of a data breach, a very interesting study that provides an economic […]

Pierluigi Paganini May 28, 2015
Marauder’s Map allows Tracking Facebook Friends with a Chrome extension

Marauder’s Map is the name of a Chrome extension developed by Aran Khanna to simply track Facebook users using Facebook Messanger data. A student from Cambridge, Aran Khanna, has developed a Chrome extension that allows tracking Facebook friends on map. The developer named the extension Marauder’s Map as the magical Marauder’s Map from the Harry Potter books that reveals all of […]

Pierluigi Paganini May 27, 2015
British navigation tech “eLoran” is under examination of US military to thwart GPS jamming

British navigation technology “eLoran” is under examination of US military to thwart GPS jamming, it is under evaluation as complementary system to the GPS. Congressman John Garamendi introduced a bill that would require the U.S. Secretary of Defense to establish a backup for GPS within three years using a new type of navigation technology pioneered by the […]

Pierluigi Paganini May 27, 2015
Linux-based Moose worm turns routers into social network bots

Linux/Moose is a malware family that targets Linux-based consumer routers turning them into social network bots to use for illegal activities. ESET released a study about a new malware known as Moose worm that is compromising devices that have a weak or default credentials. The principal target of the Moose worm are the linux-based routers, […]

Pierluigi Paganini May 27, 2015
IRS breached, hackers access data of more 100,000 taxpayers

The Internal Revenue Service (IRS) was breached by hackers that “used an online service provided by the agency” to access data for more than 100,000 taxpayers. According to the Associated Press, the Internal Revenue Service (IRS) suffered a data breach, hackers “used an online service provided by the agency” to access data for more than 100,000 taxpayers. The […]

Pierluigi Paganini May 25, 2015
Tracking wearable devices could be very easy via Bluetooth Low Energy

Researchers at Context Information Security have demonstrated that it is very easy to monitor IoT devices that implement the Bluetooth Low Energy protocol. The Internet of Things is enlarging our surface of attack, it’s not a mystery, track us is becoming even more easy as demonstrated by a group of researchers at Context Information Security. The team […]

Pierluigi Paganini May 24, 2015
Hi-tech car thieves use £30 jamming devices in car parks

Hi-tech car thieves use £30 jamming devices in car parks, the devices allow them to bypass car coding and reprogramme vehicles before driving off in them. Car thieves are becoming even more technological, we have read many news regarding hackers that designed specific solutions to hack car through the internal CAN bus or simply to unlock car doors […]

Pierluigi Paganini May 24, 2015
Security Affairs newsletter Round 10 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Chinese hackers hit Penn State University, 18K people impacted ISIS – Cyber Caliphate hackers are threatening Electronic War Use privacy software if you want to be safe from Facebook, […]