The Navis WebAccess application used in the transportation sector worldwide is affected by a high severity SQL injection vulnerability. A software used in the US ports is affected by a high severity SQL Injection vulnerability (CVE-2016-5817). The flaw was discovered by a hacker behind the online moniker “bRpsd,” the expert has discovered the vulnerability in […]
The US Department of Energy (DOE) has awarded $34 million in funding to projects aimed at the protection of power grid from cyber attacks. A cyber attack against a critical infrastructure is an event that government doesn’t exclude, for this reason, one of the pillars of their cyber strategy is the adoption of countermeasures to improve their […]
Iran ’s cyberspace security authorities are investigating a string of fires in the country oil and gas facilities. Incidents or cyber sabotage? Once again, something of strange is happening in Iran, the Government of Teheran is investigating a recent string of incidents occurred in critical infrastructure in the country. The Iran’s Supreme National Cyberspace Council […]
UAV – “Go ahead, look up [points to the sky] … see the drone? No? It’s alright, because the drone sees you. Sees your face. We know who you are.” The scene is from the movie “13 hours – The secret story of the soldiers of Benghazi”: as the member of Ansar al-Sharia looks up, […]
Google announced a new feature in the Safe Browsing warning set, it will warn users when they will receive an email message from an unauthenticated sender. Google always takes care of security, the last features announced by the IT giant will warn Gmail users when they receive an email message from an unauthenticated sender. Google […]
The US-CERT warns of the presence of multiple flaws in the Nuuo NVRmini and other network video recorders of the same vendor. The US-CERT has issued a security advisory related to the presence of multiple vulnerabilities in the Web interface of a Netgear ReadyNAS Surveillance video recorder  and various devices manufactured by the video recording company […]
FireEye documented more than 1,500 vulnerabilities affecting ICS disclosed in the past 15 years, and some of them are still present. Security of critical infrastructure is a pillar of the cyber strategy of any government, both the NIS directive and Warsaw NATO summit stressed the importance of a proper security posture to protect our systems from cyber […]
Researchers have demonstrated how crooks can make ATMs spit out thousands of dollars in cash in just a few minutes by using data stolen from EMV cards. When the EMV (Europay, MasterCard, and Visa) was introduced, the vast majority of security experts believed solved the problems caused by easy to clone magnetic stripe cards. EMV chip-equipped […]
We bring to the attention of the Security Affairs readers the interesting speech and interview dated 29/06/2016 of CIA Director John O. BRENNAN at the CFR We bring to the attention of the Security Affairs readers the interesting speech and interview dated 29/06/2016 of CIA Director John O. BRENNAN at the Council on Foreign Relations […]
The Italian model with regard to issues of cyber security and intelligence is in the process of evolution through a NATIONAL FRAMEWORK. The economic and technological systems of Western countries are highly dependent on CyberSpace, they require more and more accurate risk analysis and management of threats relate to a significant increase in cyber attacks […]