Security

Pierluigi Paganini May 08, 2015
Beware Of Game of 72, it challenges teenagers to disappear for 72 hours

Police worldwide are warning of a social media game dubbed game of 72 that is challenging teenagers to disappear for three long days. Any abuse of technology against children and youngster can have devastating effects social media them, their lives and their harmony of their families. Social media are among the paradigms that can be transformed […]

Pierluigi Paganini May 08, 2015
Flawed Open Smart Grid Protocol is a risk for Smart Grid

More than four million smart meters and similar devices worldwide are open to cyber attacks due to the security issued in the Open Smart Grid Protocol. The Open Smart Grid Protocol (OSGP) is a family of specifications published by the European Telecommunications Standards Institute (ETSI) that are implemented today by more than four million smart […]

Pierluigi Paganini May 08, 2015
PCI DSS 3.1 and SSLv3: It’s best time to remove the 20 year old SSL protocol

To address the risk PCI DSS 3.1 updates requirements 2.2.3, 2.3 and 4.1 to remove SSL and early TLS as examples of strong cryptography.  “The National Institute of Standards and Technology (NIST) has identified the Secure Socket Layers (SSL) v3.0 protocol as no longer being acceptable for protection of data due to inherent weaknesses within the […]

Pierluigi Paganini May 06, 2015
Hacking Drug Infusion Pumps, never so easy

Certain versions of common drug infusion pumps are affected by numerous remotely exploitable vulnerabilities that could not open the doors to hackers. We discussed several times about the opportunity to hack medical devices and the needs of security by design for these objects. In 2012 the US Government Accountability Office (GAO) published a report that highlighted the necessity to secure […]

Pierluigi Paganini May 05, 2015
Rombertik, a complex malware that also wipes hard drive to prevent analysis

Rombertik is the name of a high sophisticated strain of malware spotted by the researcher of the Cisco Talos Team, it wipes hard drive to prevent analysis. Security experts have uncovered new strain of malware dubbed Rombertik malware that implements high sophisticated evasion detection technique and analysis, it also includes the ability to delete victim’s […]

Pierluigi Paganini May 03, 2015
Security Affairs newsletter Round 7 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Dark Web Email Service SIGAINT hacked by the Intelligence Google Glass 2.0 Coming Soon, says Italian Luxottica Eyewear Company Hacking telesurgery robots, a concrete risk Samsung Galaxy S5 vulnerability […]

Pierluigi Paganini May 03, 2015
Mozilla Fundation, a step toward to full HTTPS implementation

The Mozilla Foundation is starting the operations to phase the HTTP connections in the Firefox browser according to “encrypt the Web” movement. According to roadmap defined by the Mozilla Foundation, the organization has started the process to move toward full HTTPS enforcement in Firefox browser In November 2014 the Electronic Frontier Foundation (EFF) and other firms, […]

Pierluigi Paganini May 02, 2015
Tor Browser 4.5 released! It comes with many improvements

Tor Browser 4.5 released! It comes with many improvements for security, privacy and usability. Download it to protect your online privacy. Are you a frequent visitor of the deep web? Is the Tor Network a necessity for your online anonymity? You must download the new release for the Tor Browser, Tor Browser 4.5, that was designed with a […]

Pierluigi Paganini May 01, 2015
Chinese AntiVirus vendor Qihoo is cheating on AV tests

Chinese Antivirus vendor Qihoo submitted products specifically tuned for the major testing labs, while was offering something different to its users. The news is disconcerting, the Chinese security firm Qihoo (CHEE-hoo) 360, is providing to its  hundreds of millions of users a product that differs from the one the it has submitted to the major testing […]

Pierluigi Paganini May 01, 2015
Why hackers target background investigation databases

Foreign hackers are targeting background investigation databases to blackmail US government personnel or to try to bribe them. It is not a mystery that Chinese hackers continuously target US companies and government offices, the attackers usually backed by the Government of Bejing mainly run cyber espionage campaigns to steal intellectual property and any kind of information related to person […]