A security consultant disclosed a security flaw in WhatsApp which can be exploited to gain access to the private chats of Android device owners. The recent acquisition of WhatsApp by Facebook has done much to discuss, ever a price so high was paid for an app, but major concerns relate to users’ privacy. The security consultant Bas Bosschert […]
A serious flaw in the certificate verification process of GnuTLS exposes Linux distros, apps to attack. Another flaw exploitable for surveillance purposes. GnuTLS is an open source secure communications library implementing the SSL, TLS and DTLS protocols, it is used in hundreds of software packages including Red Hat desktop, all Debian and Ubuntu Linux distributions and many […]
The Guardian revealed that under the surveillance program Optic Nerve the GCHQ has intercepted webcam images from millions of Yahoo users around the world. A new collection of documents leaked by Edward Snowden has made public the program Optic Nerve, yet another surveillance operation operated by the intelligence agencies since 2008. The news was reported by The Guardian, Optic […]
Secunia’s Vulnerability Review 2014 provides an interesting analysis of the number of vulnerabilities in the Top 50 portfolio products. The Secunia Vulnerability Review provides a vision on global vulnerability trends, evaluating carefully the 50 most popular programs on private PCs. These programs are practically everywhere, in many cases, they are key application for ordinary IT […]
Researchers at FireEye have developed a POC that exploits an Apple vulnerability to implement a Background Monitoring on Non-Jailbroken iOS 7 Devices. A vulnerability in Apple products is once again the center of controversy because and also in this case the user’s privacy is at risk. The excellent team of security researchers at FireEye discovered another […]
Enjoy the reading CDM for free.We are thrilled to join you at the RSA Conference 2014 with our Second Annual Edition of Cyber Defense Magazine. YOUR E-MAGAZINE HAS ARRIVED SPONSORED BY RSA CONFERENCE 2014 FLIPBOOK http://www.cyberdefensemagazine.com/annual-editions/february-2014/index.html PDF http://www.cyberdefensemagazine.com/annual-editions/february-2014/Cyber-Defense-Magazine-Annual-Edition-2014.pdf MOBILE http://www.cyberdefensemagazine.com/annual-editions/february-2014/mobile/index.html Introduction Following the tradition I am imagining the evolution of the cyber security scenario for […]
Largest Bitcoin exchange MtGox shut down after it had announced to have suffered technical issues that forced the exchange to suspend withdrawals for a week. The world’s largest Bitcoin exchange MtGox has shut down its website, suspending any activities, the news is that to be frightening, a real earthquake that raises a series of reflections […]
Apple released a security update to iOS that restores some certificate-validation checks that had apparently been missing for an unspecified amount of time. Last week Apple released a security update to iOS (iOS 7.06) to fix a flaw for certificate-validation checks that could be abused by attackers to conduct a man-in-the-middle attack within the victim’s network to capture or modify […]
iBanking is a new mobile banking Trojan available for sale in the underground for $5,000 according the RSA’s FraudAction Group. The source code for iBanking banking trojan has been leaked online through an underground forum, this kind of news reports a serious threat from the cybercrime ecosystem. Like happened for other trojan, including Zeus and Carberp, the […]
Experts at Praetorian have been conducting the Project Neptune to assess the security for designing and maintenance of mobile apps, including WhatsApp. This week the IT was shocked by the acquisition of WhatsApp by Facebook, the popular mobile messaging service was sold for $19 billion, probably this is the value assigned to the information managed by […]