Security

Pierluigi Paganini January 02, 2014
Skype’s blog and Twitter account compromised by Syrian Electronic Army

The Syrian Electronic Army (SEA) have compromised Skype ‘s Twitter account and blog to protest against the support provided to NSA surveillance programme. Syrian Electronic Army has conducted first hack of 2014 hitting Skype,  the group of hackers want to remind us that nothing is secure and that netizens will never accept the monitoring of […]

Pierluigi Paganini January 02, 2014
DROPOUTJEEP – How NSA completely controls your iPhone

Leaked documents shared by Der Spiegel show how NSA spyware codenamed DROPOUTJEEP can spy on every Apple iPhone. Apple denies any claim. Users buy the iPhone, NSA controls them. This is not a slogan for the last Apple advertising, it is the uncomfortable truth revealed by another set of NSA documents leaked by Snowden and […]

Pierluigi Paganini December 31, 2013
CDM MAGAZINE – CYBER WARNINGS DECEMBER 2013 ED. for free

CDM (CYBER DEFENSE MAGAZINE) PRESENTS: CYBER WARNINGS DECEMBER 2013 EDITION The December edition of the free Cyber Defense Magazine is out. Don’t miss it.   SPONSORED BY RSA CONFERENCE 2014 Read each FLIPBOOK edition electronically, online and flip through the page: CYBER WARNINGS E-MAGAZINE:  DECEMBER 2013 CYBER DEFENSE MAGAZINE: ANNUAL EDITION FOR 2013 Download a color PDF […]

Pierluigi Paganini December 31, 2013
Russian hacker HASH took control of a BBC server

The Russian hacker known as “HASH” and “Rev0lver” took control of a BBC server and attempted to sell access to it to other cybercriminals. A hacker compromised a server at the BBC (British Broadcasting Corporation) and started a Christmas Day campaign to sell the access to the machine to other cyber criminals. The evidences of […]

Pierluigi Paganini December 30, 2013
Der Spiegel – TAO hacking elite unit and NSA backdoor catalog revealed

Der Spiegel revealed that the TAO unit of NSA planted backdoors to access computers, hard drives, routers, and other devices from principal vendors. Germany’s Der Spiegel has published another disturbing article on the NSA surveillance activities, the media agency has published an internal NSA catalog that offers spies backdoors into a wide range of equipment from […]

Pierluigi Paganini December 29, 2013
eBay XSRF flaw allows attacker to make unauthorized purchases

EBay website is vulnerable to XSRF (Cross-site request forgery) attack that would allow an attacker to hijack an account and make unauthorized purchases. A new flaw has been discovered in the official EBay website, the vulnerability allows an attacker to hijack an account and make unauthorized purchases from the victim’s account. The flaw is not […]

Pierluigi Paganini December 27, 2013
Samsung Knox Android-based solution contains a serious flaw

An Israeli security researcher from the Ben-Gurion University of the Negev’s Cyber Security Labs has discovered a serious security flaw in Samsung Knox. Samsung Knox is affected by a serious flaw, the discovery was made by an Israeli security researcher, Mordechai Guri, from the Ben-Gurion University of the Negev’s Cyber Security Labs. Samsung Knox is […]

Pierluigi Paganini December 26, 2013
Microsoft Security Intelligence Report consecrates Turkey as malware paradise

Microsoft Security Intelligence Report states the malware encounter rate in Turkey is far greater than that of any other country in the entire world. The Microsoft Security Intelligence Report (SIR) is a periodic study of the threat landscape of exploits, vulnerabilities, and malware. It is based on data from Internet services and over 600 million […]

Pierluigi Paganini December 24, 2013
RSA refused claims on NSA Relationship and encryption backdoor

RSA published a blog post to deny the accusation about secret partnership with the National Security Agency and the use of flawed algorithm in its product. A couple of days ago on Internet was spread the news that Security firm RSA has signed a $10 million contract with the National Security Agency (NSA) to maintain […]

Pierluigi Paganini December 23, 2013
Hackers have compromised a misconfigured cloud server in less than 4hh

CloudPassage organized an exercise to demonstrated how it is simple the live server exploitation of cloud environments poorly configured. Cloud computing is considerable one of the paradigms with highest penetration level with mobile and social networking, for this reason we discussed many times on security level offere by those infrastructures that are even more targets […]