Security

Pierluigi Paganini March 14, 2014
WhatsApp flaw allows hackers to steal private Chats on Android devices

A security consultant disclosed a security flaw in WhatsApp which can be exploited to gain access to the private chats of Android device owners.    The recent acquisition of WhatsApp by Facebook has done much to discuss, ever a price so high was paid for an app, but major concerns relate to users’ privacy. The security consultant Bas Bosschert […]

Pierluigi Paganini March 05, 2014
GnuTLS flaw in certificate verification exposes Linux world to attacks

A serious flaw in the certificate verification process of GnuTLS exposes Linux distros, apps to attack. Another flaw exploitable for surveillance purposes. GnuTLS is an open source secure communications library implementing the SSL, TLS and DTLS protocols, it is used in hundreds of software packages including Red Hat desktop,  all Debian and Ubuntu Linux distributions and many […]

Pierluigi Paganini February 28, 2014
Optic Nerve, GCHQ intercepted webcam images from millions of Yahoo users

The Guardian revealed that under the surveillance program Optic Nerve the GCHQ has intercepted webcam images from millions of Yahoo users around the world. A new collection of documents leaked by Edward Snowden has made public the program Optic Nerve, yet another surveillance operation operated by the intelligence agencies since 2008. The news was reported by The Guardian, Optic […]

Pierluigi Paganini February 28, 2014
Secunia analyzed vulnerabilities in the Top 50 portfolio products

Secunia’s Vulnerability Review 2014 provides an interesting analysis of the number of vulnerabilities in the Top 50 portfolio products. The Secunia Vulnerability Review provides a vision on global vulnerability trends, evaluating carefully the 50 most popular programs on private PCs. These programs are practically everywhere, in many cases, they are key application for ordinary IT […]

Pierluigi Paganini February 27, 2014
FireEye discovered an Apple vulnerability which allows iOS keylogging

Researchers at FireEye have developed a POC that exploits an Apple vulnerability to implement a Background Monitoring on Non-Jailbroken iOS 7 Devices. A vulnerability in Apple products is once again the center of controversy because and also in this case the user’s privacy is at risk. The excellent team of security researchers at FireEye discovered another […]

Pierluigi Paganini February 25, 2014
CDM Annual Ed. is out – Security Predictions for 2014

Enjoy the reading CDM for free.We are thrilled to join you at the RSA Conference 2014 with our Second Annual Edition of Cyber Defense Magazine.   YOUR E-MAGAZINE HAS ARRIVED SPONSORED BY RSA CONFERENCE 2014 FLIPBOOK http://www.cyberdefensemagazine.com/annual-editions/february-2014/index.html PDF http://www.cyberdefensemagazine.com/annual-editions/february-2014/Cyber-Defense-Magazine-Annual-Edition-2014.pdf MOBILE http://www.cyberdefensemagazine.com/annual-editions/february-2014/mobile/index.html Introduction Following the tradition I am imagining the evolution of the cyber security scenario for […]

Pierluigi Paganini February 25, 2014
Largest Bitcoin exchange MtGox shut down, earthquake in the Bitcoin industry

Largest Bitcoin exchange MtGox shut down after it had announced to have suffered technical issues that forced the exchange to suspend withdrawals for a week. The world’s largest Bitcoin exchange MtGox has shut down its website, suspending any activities, the news is that to be frightening, a real earthquake that raises a series of reflections […]

Pierluigi Paganini February 24, 2014
Apple restores certificate validation checks mysteriously missed

Apple released a security update to iOS that restores some certificate-validation checks that had apparently been missing for an unspecified amount of time. Last week Apple released a security update to iOS (iOS 7.06) to fix a flaw for certificate-validation checks that could be abused by attackers to conduct a man-in-the-middle attack within the victim’s network  to capture or modify […]

Pierluigi Paganini February 24, 2014
iBanking Mobile Bot Source Code available for sale in the underground

iBanking is a new mobile banking Trojan available for sale in the underground for $5,000 according the RSA’s FraudAction Group.  The source code for iBanking banking trojan has been leaked online through an underground forum, this kind of news reports a serious threat from the cybercrime ecosystem. Like happened for other trojan, including Zeus and Carberp, the […]

Pierluigi Paganini February 22, 2014
WhatsApp lack enforcing certificate pinning, users exposed to MITM

Experts at Praetorian have been conducting the Project Neptune to assess the security for designing and maintenance of mobile apps, including WhatsApp. This week the IT was shocked by the acquisition of WhatsApp by Facebook, the popular mobile messaging service was sold for $19 billion, probably this is the value assigned to the information managed by […]