Security

Pierluigi Paganini May 12, 2015
US Secretary of Homeland Security fears an escalation of terrorism

The United States Secretary of Homeland Security explained that the terrorism has entered a “new phase” and fears an escalation. The terrorism is probably the first concern for the US Government, the Americans fears a possible and imminent attack on the US soil. In an interview with ABC News, Jeh Johnson, the current United States Secretary of […]

Pierluigi Paganini May 11, 2015
PHP hash comparison flaw is a risk for million users

New PHP vulnerability dubbed ‘Magic Hash’ being found by Robert Hansen (aka RSnake) of WhiteHat Security can enable attackers into breaching users’ accounts. New vulnerability dubbed ‘Magic Hash’ being found by Robert Hansen (aka RSnake) of WhiteHat Security can enable attackers into breaching users’ accounts. Because of a security flaw according to which PHP tackles […]

Pierluigi Paganini May 10, 2015
Security Affairs newsletter Round 8 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Trustwave discovered the first political malvertising campaign Mozilla Fundation, a step toward to full HTTPS implementation How Selerity reported Twitter’s earnings—before Twitter did Carders crack Hard Rock casino Australian […]

Pierluigi Paganini May 09, 2015
95 percent of SAP systems were exposed to vulnerabilities

Onapsis study found that over 95% of SAP systems are exposed to vulnerabilities that could lead to full compromise of the company’s business. SAP is one of the most popular enterprise software used by companies to manage business operations and customer relations. A recent study conducted by the SAP solutions provider revealed that more than 95 percent […]

Pierluigi Paganini May 09, 2015
Facebook Friends Mapper – How to crawl Hidden Friends

Hackers have a new tool in their arsenal dubbed Facebook Friends Mapper that allows them to crawl Facebook Hidden Friends list just in a click. Facebook users can protect their privacy by setting the “privacy level” for every information related their profile or content they post online. Users can decide to completely set as private the information in […]

Pierluigi Paganini May 08, 2015
Beware Of Game of 72, it challenges teenagers to disappear for 72 hours

Police worldwide are warning of a social media game dubbed game of 72 that is challenging teenagers to disappear for three long days. Any abuse of technology against children and youngster can have devastating effects social media them, their lives and their harmony of their families. Social media are among the paradigms that can be transformed […]

Pierluigi Paganini May 08, 2015
Flawed Open Smart Grid Protocol is a risk for Smart Grid

More than four million smart meters and similar devices worldwide are open to cyber attacks due to the security issued in the Open Smart Grid Protocol. The Open Smart Grid Protocol (OSGP) is a family of specifications published by the European Telecommunications Standards Institute (ETSI) that are implemented today by more than four million smart […]

Pierluigi Paganini May 08, 2015
PCI DSS 3.1 and SSLv3: It’s best time to remove the 20 year old SSL protocol

To address the risk PCI DSS 3.1 updates requirements 2.2.3, 2.3 and 4.1 to remove SSL and early TLS as examples of strong cryptography.  “The National Institute of Standards and Technology (NIST) has identified the Secure Socket Layers (SSL) v3.0 protocol as no longer being acceptable for protection of data due to inherent weaknesses within the […]

Pierluigi Paganini May 06, 2015
Hacking Drug Infusion Pumps, never so easy

Certain versions of common drug infusion pumps are affected by numerous remotely exploitable vulnerabilities that could not open the doors to hackers. We discussed several times about the opportunity to hack medical devices and the needs of security by design for these objects. In 2012 the US Government Accountability Office (GAO) published a report that highlighted the necessity to secure […]

Pierluigi Paganini May 05, 2015
Rombertik, a complex malware that also wipes hard drive to prevent analysis

Rombertik is the name of a high sophisticated strain of malware spotted by the researcher of the Cisco Talos Team, it wipes hard drive to prevent analysis. Security experts have uncovered new strain of malware dubbed Rombertik malware that implements high sophisticated evasion detection technique and analysis, it also includes the ability to delete victim’s […]