Security

Pierluigi Paganini July 21, 2013
Vulnerability on SIM cards compromises security for millions of phones

A vulnerability on SIM cards, and in particular on the DES algorithm for the encryption, could compromise the security of mobile phones. A serious vulnerability on SIM cards used in some mobile phones has been found, exploiting the flaw an attacker could eavesdrop on phone conversations, could install malicious applications on the device or it could impersonalize […]

Pierluigi Paganini July 21, 2013
Uncovered an unusual attacks based on anomalous file infector

Security experts uncovered an unusual cyber espionage campaign based on file infector belonging to the PE_EXPIRO family that includes information theft module Security experts at TrendMicro uncovered an unusual espionage campaign that hit United States users based  on malware having file infector with stealing capabilities. The attackers acted with specific intent to steal information from organizations or […]

Pierluigi Paganini July 18, 2013
“Cyber-crime, securities markets and systemic risk” study released

“Cyber-crime, securities markets and systemic risk” is the study issued by IOSCO and WFE that discussed systemic impact by cybercrime on securities markets “Cyber-crime, securities markets and systemic risk” is the title of a paper issued by The International Organization of Security Commissions (IOSCO), a leading policy forum for securities regulators, and the World Federation […]

Pierluigi Paganini July 17, 2013
Trend Micro – targeted attack against Europe-Asia government agencies

Trend Micro uncovered targeted attack against European and Asian government agencies to steal login credentials from IE and Microsoft Outlook products. A new targeted attack has been uncovered by Trend Micro security experts, the hackers hit European government agencies trying to steal login credentials from Internet Explorer (IE) and Microsoft Outlook. The attackers trying to […]

Pierluigi Paganini July 17, 2013
New Android Master Key attack revealed by Android Security Squad

The China-based group Android Security Squad revealed a new Android Master Key attack that exploits the vulnerability in the way the OS reads APK files allowing modification of signed legitimate apps. The China-based group Android Security Squad found for the second time a serious vulnerability in Android master key management. In the last days it was […]

Pierluigi Paganini July 14, 2013
Critical Facebook vulnerability allows account hacking

Security expert Dan Melamed discovered a critical Facebook vulnerability would allow an attacker to take complete control over any account. A critical Facebook vulnerability would allow an attacker to take complete control over any account, the discovery was made by Dan Melamed, a security researcher, web developer, self-employed internet marketer, and entrepreneur. Dan was recently […]

Pierluigi Paganini July 14, 2013
Cybercriminals Leveraging Facebook Report

Cybercriminals Leveraging Facebook is the title of  a research that provided evidence that criminal organizations are exploiting Facebook for illegal activities. Cybercriminals Leveraging Facebook, this is the title of an interesting research conducted by Eric Feinberg, Ian Malloy and Frank Angiolelli that provided evidence of the existence of highly organized criminal networks that are exploiting the popular social network for […]

Pierluigi Paganini July 13, 2013
Microsoft provided encrypted messages key and Skype calls access to NSA

The guardian issued new top secret documents gathered by Edward Snowden demonstrating the intense collaboration between Microsoft and US government. Edward Snowden has issued new top secret documents demonstrating the intense collaboration between Microsoft and US government, in particular the whistleblower revealed the support received by the NSA that obtained by the company the access to […]

Pierluigi Paganini July 12, 2013
Secret service agents have plenty of options in accessing our data

Secret service agents of Intelligence agencies all over the world, such as Mossad, MI6 and NSA have plenty of options in accessing our data. The recent revelations by Edward Snowden about how the US secret service National Security Agency has massive access to almost everyone’s data stored by the telecommunications and cloud service providers over […]

Pierluigi Paganini July 12, 2013
HP warns on presence of backdoor in storage devices

HP publicly admitted the presence of backdoor in its StoreVirtual storage products designed to respond to the needs of virtualized environments. HP publicly admitted the presence of backdoor in its storage products, in particular the company revealed the presence of an undocumented administrative account in the product family StoreVirtual designed to respond to the needs of virtualized […]