Quantum computing in credit cards introduces a new type of encryption (quantum cryptography) that will make magnetic strips and EVS solutions obsolete. Nowadays getting credit card credentials it’s not difficult and you don’t need to have technical skills, you can just buy them in the dark web, but that’s may change in the future thanks […]
The United States Secretary of Homeland Security explained that the terrorism has entered a “new phase” and fears an escalation. The terrorism is probably the first concern for the US Government, the Americans fears a possible and imminent attack on the US soil. In an interview with ABC News, Jeh Johnson, the current United States Secretary of […]
New PHP vulnerability dubbed ‘Magic Hash’ being found by Robert Hansen (aka RSnake) of WhiteHat Security can enable attackers into breaching users’ accounts. New vulnerability dubbed ‘Magic Hash’ being found by Robert Hansen (aka RSnake) of WhiteHat Security can enable attackers into breaching users’ accounts. Because of a security flaw according to which PHP tackles […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Trustwave discovered the first political malvertising campaign Mozilla Fundation, a step toward to full HTTPS implementation How Selerity reported Twitter’s earnings—before Twitter did Carders crack Hard Rock casino Australian […]
Onapsis study found that over 95% of SAP systems are exposed to vulnerabilities that could lead to full compromise of the company’s business. SAP is one of the most popular enterprise software used by companies to manage business operations and customer relations. A recent study conducted by the SAP solutions provider revealed that more than 95 percent […]
Hackers have a new tool in their arsenal dubbed Facebook Friends Mapper that allows them to crawl Facebook Hidden Friends list just in a click. Facebook users can protect their privacy by setting the “privacy level” for every information related their profile or content they post online. Users can decide to completely set as private the information in […]
Police worldwide are warning of a social media game dubbed game of 72 that is challenging teenagers to disappear for three long days. Any abuse of technology against children and youngster can have devastating effects social media them, their lives and their harmony of their families. Social media are among the paradigms that can be transformed […]
More than four million smart meters and similar devices worldwide are open to cyber attacks due to the security issued in the Open Smart Grid Protocol. The Open Smart Grid Protocol (OSGP) is a family of specifications published by the European Telecommunications Standards Institute (ETSI) that are implemented today by more than four million smart […]
To address the risk PCI DSS 3.1 updates requirements 2.2.3, 2.3 and 4.1 to remove SSL and early TLS as examples of strong cryptography. “The National Institute of Standards and Technology (NIST) has identified the Secure Socket Layers (SSL) v3.0 protocol as no longer being acceptable for protection of data due to inherent weaknesses within the […]
Certain versions of common drug infusion pumps are affected by numerous remotely exploitable vulnerabilities that could not open the doors to hackers. We discussed several times about the opportunity to hack medical devices and the needs of security by design for these objects. In 2012 the US Government Accountability Office (GAO) published a report that highlighted the necessity to secure […]