Security

Pierluigi Paganini July 03, 2014
Geodo, the banking trojan with email self-spreading feature

Security researchers from Seculert firm have discovered a variant of the Cridex banking worm, dubbed Geodo, which spreads itself through email. In the last months a significant number of banking trojans have been proposed by cyber criminal ecosystem, from EMOTET to Dyreza, criminals have used a wide casuistry of techniques to deceive bank customers. The primary purpose of the […]

Pierluigi Paganini July 02, 2014
How many queries US Intelligence agencies made to Section 702 content data in 2013?

A letter revealed that all the US Intelligence agencies have queried the Section 702 communications content for US persons in 2013. The Snowden case has caused an earthquake in the US intelligence, it is changing the way the principal US agencies are informing citizens of the some of the operation their ordinary conduct to ensure […]

Pierluigi Paganini July 01, 2014
Microsoft Seized No-IP Domains, Millions dynamic DNS users affected

Executing an order of a Nevada Court, Microsoft has seized domains belonging to the No-IP.com Dynamic DNS Service affecting the traffic of million users. Microsoft has executed a large-scale operation against a malware network thought to be responsible for more than 7.4 million infections of Windows machines worldwide. The operation conducted by Microsoft has brought down millions of […]

Pierluigi Paganini July 01, 2014
Kaspersky Lab reveals an increase in RDP bruteforce attacks

Security experts at Kaspersky Lab have issued data related to the number of RDP brute force attacks on its clients which show a worrying trend. In the June Kaspersky Lab has included in its products an Intrusion Detection System, which allowed the company to analyze  more information on going attacks on its clients. Kaspersky has issued the data […]

Pierluigi Paganini June 30, 2014
Facebook experiment shows feasibility of massive-scale emotional contagion through social networks

A Facebook experiment conducted with the Cornell and the University of California provides evidence of massive-scale emotional contagion through social networks. Facebook is the subject of a heated debate for a psychological experiment the company has conducted on nearly 700,000 people without their knowledge. The Facebook experiment was carried out in 2012 and was related to the manipulation of content on […]

Pierluigi Paganini June 29, 2014
Why the agreement between ENISA and EUROPOL is strategic?

ENISA and Europol have signed an agreement with the intent to facilitate the cooperation in the fight to the cyber criminal activities. The fight to the cybercrime needs a joint effort of governments, law enforcement agencies and private entities. Cyber threats are becoming even more sophisticated and bad actors behind them are structured in efficient organizations difficult […]

Pierluigi Paganini June 28, 2014
Android 4.3 and Earlier affected by Critical Code-Execution Flaw

A serious code-execution vulnerability in Android 4.3 and earlier was patched with latest KitKat Android Operating System version. Are you using the Android 4.3 version and you are convinced to be secure? You are unfortunately wrong, because this version of Android and earlier are affected by a critical code-execution vulnerability. According to data proposed by the Android […]

Pierluigi Paganini June 27, 2014
PlugX RAT with Time Bomb abuses Dropbox in targeted attacks

Trend Micro analyzed a targeted attack against a Taiwanese government entity which used a variant of the PlugX RAT that abuses the Dropbox service. Researchers from Trend Micro discovered that a targeted attack against a government agency in Taiwan was conducted using a variant of the PlugX remote access tool (RAT) which abuses the popular file hosting service […]

Pierluigi Paganini June 26, 2014
Critical flaw in TimThumb plugin menaces the WordPress world

A critical vulnerability in the WebShot feature implemented by TimThumb plugin expose WordPress instance to Remote Code Execution attacks. The popular image resizing library TimThumb used in many WordPress themes, 3rd party components and plugins is affected by a critical vulnerability which allows an attacker for certain commands to be remotely executed, without authentication, on the vulnerable website. The discovery of the […]

Pierluigi Paganini June 26, 2014
PayPal two-factor authentication for mobile apps is flawed

Security experts at Duo Security have discovered a serious flaw in the implementation of two-factor authentication which allow attackers to bypass it. Two-factor authentication processes if flawed could give to companies a false sense of security even if we are discussing of PayPal. In the past we have explained how to by-pass Two-factor authentication in various ways, for example, using […]