Police worldwide are warning of a social media game dubbed game of 72 that is challenging teenagers to disappear for three long days. Any abuse of technology against children and youngster can have devastating effects social media them, their lives and their harmony of their families. Social media are among the paradigms that can be transformed […]
More than four million smart meters and similar devices worldwide are open to cyber attacks due to the security issued in the Open Smart Grid Protocol. The Open Smart Grid Protocol (OSGP) is a family of specifications published by the European Telecommunications Standards Institute (ETSI) that are implemented today by more than four million smart […]
To address the risk PCI DSS 3.1 updates requirements 2.2.3, 2.3 and 4.1 to remove SSL and early TLS as examples of strong cryptography. “The National Institute of Standards and Technology (NIST) has identified the Secure Socket Layers (SSL) v3.0 protocol as no longer being acceptable for protection of data due to inherent weaknesses within the […]
Certain versions of common drug infusion pumps are affected by numerous remotely exploitable vulnerabilities that could not open the doors to hackers. We discussed several times about the opportunity to hack medical devices and the needs of security by design for these objects. In 2012 the US Government Accountability Office (GAO) published a report that highlighted the necessity to secure […]
Rombertik is the name of a high sophisticated strain of malware spotted by the researcher of the Cisco Talos Team, it wipes hard drive to prevent analysis. Security experts have uncovered new strain of malware dubbed Rombertik malware that implements high sophisticated evasion detection technique and analysis, it also includes the ability to delete victim’s […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Dark Web Email Service SIGAINT hacked by the Intelligence Google Glass 2.0 Coming Soon, says Italian Luxottica Eyewear Company Hacking telesurgery robots, a concrete risk Samsung Galaxy S5 vulnerability […]
The Mozilla Foundation is starting the operations to phase the HTTP connections in the Firefox browser according to “encrypt the Web” movement. According to roadmap defined by the Mozilla Foundation, the organization has started the process to move toward full HTTPS enforcement in Firefox browser In November 2014 the Electronic Frontier Foundation (EFF) and other firms, […]
Tor Browser 4.5 released! It comes with many improvements for security, privacy and usability. Download it to protect your online privacy. Are you a frequent visitor of the deep web? Is the Tor Network a necessity for your online anonymity? You must download the new release for the Tor Browser, Tor Browser 4.5, that was designed with a […]
Chinese Antivirus vendor Qihoo submitted products specifically tuned for the major testing labs, while was offering something different to its users. The news is disconcerting, the Chinese security firm Qihoo (CHEE-hoo) 360, is providing to its hundreds of millions of users a product that differs from the one the it has submitted to the major testing […]
Foreign hackers are targeting background investigation databases to blackmail US government personnel or to try to bribe them. It is not a mystery that Chinese hackers continuously target US companies and government offices, the attackers usually backed by the Government of Bejing mainly run cyber espionage campaigns to steal intellectual property and any kind of information related to person […]