A security bulletin recently released by Microsoft addresses the LNK flaw that was exploited by Stuxnet and that we have wrongly considered patched since 2010. If you followed IT in the last years, you might remember that Stuxnet was discovered around mid-2010 and at the time it was used against the Iranian nuclear program. The […]
The Verizon’s 2015 PCI Compliance Report reveals that eighty percent of merchants fails interim PCI DSS compliance assessment. According to a new report by Verizon Communications Inc., nearly 80 percent of global merchants, including retailers, financial institutions, and hospitality firms are not in compliance with card data security standards. The Reuters agency reported that 5,000 merchants in 30 countries […]
A new approach based on windows products IDs for dynamic mutex could allow the creation of new malware running undetected on systems for much more time. Before talking about “TreasureHunter” itself, I think it’s worth to give you a background about mutex and as Microsoft says: “For example, to prevent two threads from writing to […]
A new interesting report published by The Intercept details the effort spent by the US intelligence to compromise the security of Apple devices. The Intercept published another disconcerting post on the US Intelligence campaign aimed to steal the secrets of the IT giant Apple. According to top-secret documents disclosed by The Intercept a team of researchers working with the Central […]
Security firm Digital Shadows has realized a search engine for the Deep Web that according the company CEO “sucks in pages in real time”. The deep web is the part of the world wide web not indexed by common search engines, it represents almost all of the content available on the Internet. Law enforcement, intelligence […]
Internet users that have recently installed or updated the popular BitTorrent client ÎŒTorrent 3.4.2 Build 28913 may have installed a Bitcoin miner. Internet users that have recently installed or updated the popular BitTorrent client ÎŒTorrent 3.4.2 Build 28913 had a nasty surprise, the application, in fact, installed a Bitcoin miner as explained in this advisory. “Users […]
Kaspersky Lab experts carried out a study of the principal threats for children encountered in 2014 by users of the Parental Control module. The Internet is a dangerous place for Children, almost every teenager is always online through desktop PC and mobile device, resulting exposed to dangerous threats. The dangers are not negligible for children […]
The increasing number of cyber incidents along with a significant improvement of TTP adopted by threat actors requests the adoption of a cyber hygiene. The rate of data breaches are increasing drastically throughout the year. Cyber-attacks could cause severe disruption to a companyâs business functions or operational supply chain, impact reputation, compromise customer information or […]
According to a security advisory published by Microsoft all supported versions of Windows are affected by the recently discovered FREAK vulnerability FREAKÂ is major security SSL/TLS vulnerability recently discovered that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of legitimate and secure websites. The critical […]
FREAK, a new major security flaw that left users of Apple and Google devices exposed to MITM attack while visiting supposedly secure Websites. Few days back security researchers group (named as SMACK ) made everyone aware of a new SSL/TLS vulnerability, termed as FREAKÂ (CVE-2015-0204). FREAK stands for Factoring Attack on RSA-EXPORT Keys. After POODLE, it […]