Security

Pierluigi Paganini April 29, 2015
Discover your Master padlock number of quick steps

The popular security expert Samy Kamkar illustrated a method to easily crack many Master padlock combinations in eight tries or less. Have you ever gone in the Gym and after a long and tiring workout forget your padlock numbers? I sure did, but next time I will not call the janitor, I will try to […]

Pierluigi Paganini April 28, 2015
Almost 90% of Java black hats migrate to softer footling Flash targets after MS Patch or die policy

The stricken-scum now deal with an option: work harder in order to find Java zero days or simply abandon dispatch and begin exploiting older Flash-bugs. Redmond’s security heads trust – Matt Miller, Tim Rains and David Watson – claim its patch wrecking-ball, employed only to out of the date Java installations previous year, which forced […]

Pierluigi Paganini April 27, 2015
US hospitals will use AC power probes to remove malware from medical devices

WattsUpDoc is a platform developed by two researchers for the monitoring of medical devices and detection of potentially “life-threatening malware.” Two US Hospitals will start using a system that can detect malware infections of medical devices, the technique relies on a probe that monitors the AC power consumption of the units. The hospitals (name were […]

Pierluigi Paganini April 26, 2015
Security Affairs newsletter Round 6 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Google To Speed Up The Internet With Its New QUIC Protocol APT28 Russian hackers exploited two zero-day flaws in the wild Security Affairs newsletter Round 5 – Best of […]

Pierluigi Paganini April 25, 2015
Trains controlled by European Rail Traffic Management System could potentially be hacked

The European Rail Traffic Management System is a signalling system that will control all the Britain’s trains and it could potentially be hacked. By increasing the penetration level of the technology in our ordinary life, we are increasing our surface of attack. We have discussed many times about the risks for critical infrastructure, but threat […]

Pierluigi Paganini April 24, 2015
48,000 Windows XP PCs are still running at TEPCO … which are the risks?

Which is the impact of the Windows XP End of Life on the critical infrastructure? Recently a Government audit found 48,000 XP PCs still running at TEPCO. One year ago the end of life for Microsoft Windows XP raised a heated debate on security for all the infrastructure that still adopt the popular OS. Windows XP […]

Pierluigi Paganini April 24, 2015
Magento Flaw Exploited in the Wild a few hours after disclosure

Sucuri revealed that cyber criminals are attempting to hijack online shops based on Magento platform by exploiting a recently disclosed critical flaw. According to the security experts at Sucuri firm, within 24 hours after the disclosure of the vulnerability in Magento platform, bad actors are already attempting to hack e-commerce websites using it. The experts traced back the attacks […]

Pierluigi Paganini April 22, 2015
Spy in the sandbox attack to spy on your online activity

Four security researchers at the Columbia University have developed a new technique dubbed Spy in the sandbox attack to spy on victims’ online activity. Four security researchers at the Columbia University (Yossef Oren, Vasileios Kemerlis, Simha Sethumadhavan, and Angelos Keromytis) have developed a new technique to hack computer using a Javascript that allow them to […]

Pierluigi Paganini April 21, 2015
Google Ads will pass to be fully encrypted

Google is improving its services, last decision it related to the Ads, the company takes a step towards by deployeng “HTTPS Everywhere”. Another good step, coming from google involving encryption. As you may remember Google started to encrypt back in 2008, when Gmail started to use HTTPS. Since 2008, Google has done a remarkable work […]

Pierluigi Paganini April 19, 2015
Security Affairs newsletter Round 5 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Darwin kernel, just an IP packet to cause the crash of Apple devices How far do stolen data get in the deep web after a breach? NSA dreams of […]