Symantec issued 2013 Norton Report, the annual research study which examines the consumers’ online behaviors, the dangers and financial cost of cybercrime. Symantec has released the 2013 Norton Report, the annual study of evolution of principal cyber threats in the security landscape. The study presented concerning results on the constant growth of cyber criminal activities. The 2013 […]
Researcher Daniel Pistelli demonstrated how to exploit Mac internally encryption mechanism to create an undetectable Mac OS X Malware. During the last couple of years the number of cyber threats that targeted Mac is increased significantly, the main reasons are the wide diffusion of Apple devices and lack of awareness of Apple users. In particular the number […]
German firm SRL has found another serious security issue in iOS 7 that allows an attacker to access the iPhone and potentially gain control over owner Apple ID New security issues for iOS 7, a new vulnerability in TouchID Fingerprint Scanner and iCloud has been found by a German security firm SRL. The flaw allows an attacker with a physical access to the locked […]
Internet of Things, a business growing at a compound annual rate of 7,9% that is a privileged target for hackers and cyber criminals. The Internet of Things refers all objects in daily life equipped with identifiers that allow their automatic inventory. Tagging of the Internet of Things could be achieved with various technologies such as the RFID, […]
Top-secret presentation Tor Stinks leaked by Snowden shows the techniques implemented by the NSA to overwhelm Tor Anonymity with manual analysis. Tor anonymity has been debated many times, according to majority security experts it was one of the most secure ways to stay online being far from prying eyes avoiding government surveillance. Recently a series of events have completely changed […]
IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a detailed analysis of current security landscape, including data on main cyber threats and information on mitigation techniques. IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a study that identifies Social media as the main target of cyber criminal activities. The powerful social networking […]
Adobe reveals customer data stolen in security breach, hackers have accessed sensitive information for 2.9 million users and to the source code of many products. Adobe Systems Inc has warned that customer data stolen in a security breach. According an official advisory, 2.9 million customers might have had their information stolen due a cyber attack that hit […]
FireEye security firm released World War C report to explain nation-state motives behind advanced Nation-state driven cyber attacks. Nation-state driven cyber attacks are routinely conducted on a global scale to defend national sovereignty and project national power. We are living in the cyber era, human conflict is involving also the fifth domain of warfare, the cyberspace. As never […]
FBI seizes underground drug market Silk Road and identified its owner. The site was producing earning for more than $1.2 billion in business. The FBI has closed the popular black market Silk Road after many years of investigation, the website hosted in the Tor Network was seized by US law enforcement. Last year a research made by the Carnegie Mellon […]
Vulnerability In Android Firefox browser app allows hackers to steal user’s files from the SD Card And Firefox’s Privately Stored Data. Androidpolice blog reported that security researcher Sebastián Guerrero discovered an Android Firefox browser app vulnerability that allows hackers to access both the contents of the SD card and the browser’s private data. Once again mobile security is under discussion, the number of […]