Security

Pierluigi Paganini February 26, 2015
Doubts about how CSE monitors Canadian emails to the Government

New secret documents leaked by Snowden reveal that CSE monitors millions of Canadian emails to Government, but privacy advocates criticized how CSE does it. Privacy advocates and Canadians are worried by the last bunch of document leaked by Edward Snowden related to the surveillance activities conducted by the Canadian Security Establishment (CSE). The national broadcaster Canadian […]

Pierluigi Paganini February 24, 2015
A critical remote execution flaw spotted in Samba Win-Linux interop code

CVE-2015-0240 is a critical security flaw in Samba that resides in the smbd file server daemon and can be exploited by a malicious Samba client remotely. Linux administrators urge to update their systems due to the discovery of a critical vulnerability the open source Linux-and-Windows-compatibility software Samba. The vulnerability in Samba, coded as CVE-2015-0240, affects versions […]

Pierluigi Paganini February 22, 2015
Samsung smartTVs don’t encrypt voice and text data

Samsung smartTV send unencrypted voice recognition data and text information across the Internet without encrypt it, allowing hackers to capture them. A few days ago I was one of the first to publish the news about the Samsung privacy policy that reports smartTV are sending user voice data to third parties. “Samsung SmartTV transmits data […]

Pierluigi Paganini February 22, 2015
PowerSpy – How to spy on mobile users by monitoring the power supply

A group of researchers has proposed a new technique dubbed PowerSpy to track mobile users’ location by analyzing data related to the power supply. A group of researchers at Stanford University and the Israeli defense company Rafael has discovered a way to track mobile devices by analyzing the power supply. The experts have proposed a technique […]

Pierluigi Paganini February 21, 2015
Shodan Founder finds 250,000 routers sharing same SSH keys

The Founder of Shodan John Matherly was revamping the SSH banner when discovered a large number of devices that share same SSH keys. The Founder of Shodan, John Matherly, has conducted in December 2014 a personal research discovering that more than 250,000 routers used in Spain and deployed by Telefonica de Espana, and thousands more used in other […]

Pierluigi Paganini February 20, 2015
“TNT” gang has released a new hardware TDoS tool in the criminal underground

Telephone DDoS attacks are on the rise, the  criminal group known as “TNT” gang has released a new hardware tool in the underground ecosystem. The IntelCrawler cyber threat intelligence company has discovered a new advanced tool, dubbed ‘TNT Instant Up’, for Telephone Denial of Service attacks (TDoS). TDoS is a common practice in the criminal underground, it consists in flooding […]

Pierluigi Paganini February 20, 2015
The Future of Data Security: DNA Cryptography and Cryptosystems

DNA Cryptography can be defined as a hiding data in terms of DNA Sequence. Why DNA Cryptography and which are the principal benefits for its adoption? DNA Computing Information Security is very vital in today’s digital era of e-commerce and e-business. While 2014 was “The Year of Data Breach”, 2015 is off to a fast […]

Pierluigi Paganini February 19, 2015
Lenovo sold laptop with pre-installed Superfish malware

The Lenovo computer company knowingly shipped laptops with pre-installed Superfish malware. And ‘controversy on the web, users are outraged. Lenovo is in the storm one again, security experts discovered that the company is shipping laptops with Superfish malware , a malware that allows to steal web traffic using man-in-the-middle attacks. SuperFish is considered by many antivirus companies as […]

Pierluigi Paganini February 18, 2015
25 billion Cyberattacks hit systems in Japan during 2014

The National Institute of Information and Communications Technology revealed that more than 25 billion cyberattacks hit  systems in Japan during 2014. I decided to write this post to highlight the importance of a cybersecurity posture for any government. When the majority of people thinks to cybersecurity, has no idea of principal cyber threats and their […]

Pierluigi Paganini February 18, 2015
BadUSB attack and the Industrial control systems

Industrial control systems are in danger of being hacked by using a modified version of the BadUSB attack says Michael Toecker in his presentation at the Security Analyst Summit 2015 in Cancun. Not that long ago, BadUSB swept across the cybersecurity community as one of the hottest hacks of the year. BadUSB featured the ability […]