Banning Tor network would bring a lot of public distress and would raise reactions, according to Governmental advisors and thus David Cameron is left without support on the matter of banning encryption. The MPs know really well that the Internet is a really magnificent service that can be used in an excellent manner by simple […]
Pocketables revealed that Google is secretly working on a Virtual Private Network (VPN) service named Google VPN for use on open WiFi networks. Google is working to improve security of its mobile users, according to people at Pocketables the IT giant is secretly working on a Virtual Private Network (VPN) service, dubbed ‘Google VPN’. “Unfortunately, […]
Adobe released security updates for Adobe Flash Player to fix 11 Critical Vulnerabilities, most of them Remote Code Execution flaws. Adobe has issued a critical update for the Flash Player product that fixes set of 11 critical security vulnerabilities in its software. The update is classified as critical because most of the security flaws could […]
Data exfiltration is mechanism to data breach that occurs when an individualâs or organization’s data is illegally copied from its systems. Itâs not a matter of âifâ you will be attacked, but âwhenâ. Preventing attackers from breaching our system is a necessity and stopping them before they can complete their mission is a requirement. Analyzing […]
A recent study published by Veracode on mobile security revealed that 2,400 unsafe applications are in average installed in large enterprise. Mobile devices are becoming an integral part of the enterprise architecture, security depends heavily on the use that is made with mobile devices and from the policies adopted to protect the company from cyber […]
The Eu plans for a new European counter-terrorism unit that  will tackle extremists online in a joint effort of law enforcement from various states. Terrorists are exploiting the web for propaganda purpose and to menace the Western infidels for this reason intelligence agencies and law enforcement need to increase their efforts to tackle any kind of extremist […]
Security Experts at Malwarebytes security firm spotted a new  Facebook worm that spreads itself by leveraging multiple cloud services. Social media are a privileged attack vector, recent reports published by the principal security firms confirm that cyber criminal are exploiting these platforms for illegal activities. Last disastrous news for the users of the popular social […]
Expert at Cisco discovered a privacy breach caused by a software problem, which exposed personal information of users that opted for privacy setting. A software problem occurred at Google have exposed personal information of users that registered their website and had chosen to keep their profile private. The flaw affected the whois database that contains contact […]
A security bulletin recently released by Microsoft addresses the LNK flaw that was exploited by Stuxnet and that we have wrongly considered patched since 2010. If you followed IT in the last years, you might remember that Stuxnet was discovered around mid-2010 and at the time it was used against the Iranian nuclear program. The […]
The Verizon’s 2015 PCI Compliance Report reveals that eighty percent of merchants fails interim PCI DSS compliance assessment. According to a new report by Verizon Communications Inc., nearly 80 percent of global merchants, including retailers, financial institutions, and hospitality firms are not in compliance with card data security standards. The Reuters agency reported that 5,000 merchants in 30 countries […]