Security

Pierluigi Paganini February 08, 2015
The GHOST vulnerability is a threat to critical business applications

Researchers at Veracode discovered that nearly 41% of enterprise applications using GNU C Library employ the Ghost-ridden ‘gethostbyname’ function. GNU C Library (glibc) vulnerability, named as the GHOST vulnerability, was released by Qualys Guard on 27th January 2015. Severity of this vulnerability is “CRITICAL” and listed in CVE database as CVE-2015-0235. Vulnerability is termed as […]

Pierluigi Paganini February 08, 2015
Samsung SmartTV models transmit voice, and more, to a third-party service

Samsung SmartTV transmits data to a third party, be aware that if your spoken words include personal or other sensitive information. We have discussed several times about the privacy and security issues related to the Internet of Things devices, Smart meters and Smart TV are intelligent devices that could be exploited by hackers to collect our sensitive […]

Pierluigi Paganini February 07, 2015
11 percent of mobile banking apps includes harmful code

A recent study published by RiskIQ security firm revealed that more than 11 percent of mobile banking apps includes harmful code. With the rapid spread of mobile banking services has increased significantly the number of cyber crimes targeting users of major financial institutions. According to an interesting research conducted by the company RiskIQ more than 11 […]

Pierluigi Paganini February 07, 2015
Fake WhatsApp for Web offered in the wild

Cybercriminals are offering worldwide a fake WhatsApp for Web in spam campaign with the intent to serve banking malware and run other kinds of scams. Recently WhatsApp launched its web service that could be used by using Google Chrome and allows users to access all the conversations and messages from the mobile device. “Our web client is […]

Pierluigi Paganini February 06, 2015
Black box attack, hacking an ATM with Raspberry Pi

The black box attacks are a new alarming trend in the criminal ecosystem, the experts Olga Kochetova and Alexey Osipov have provided a proof-of-concept. Cyber criminals can hack ATM systems and force them to dispense the cash by sending a command through a smartphone, in this attack scenario the mobile devices are used only to send […]

Pierluigi Paganini February 05, 2015
CYBERPOL CALLS ON GOOGLE TO TAKE DOWN HARMFUL CONTENT

CYBERPOL Organization urges a joint effort between private firms and law enforcement to remove illegal and harmful content from the Internet. CYBERPOL, the International Cyber Security Organization ICSO, said that illegal and harmful content capable of affecting the physical, emotional and psychological well-being of all Internet users are increasing at alarming and disturbing rates. It […]

Pierluigi Paganini February 04, 2015
Severe XSS flaw affects fully patched Internet Explorer

Security experts discovered a new severe XSS flaw affects fully patched Internet Explorer and exposes users to risks of attacks and identity theft. A new critical cross-site scripting (XSS) vulnerability affects fully patched versions of Internet Explorer, the flaw could be exploited by hackers to steal user sensitive data (i.e. login credentials) and inject malicious […]

Pierluigi Paganini February 03, 2015
Cybercrime – UNICRI study analyzed risks for the economy and enterprises

UNICRI published a study on the impact of the cybercrime on the economy in the Europen region with a specific focus on the effect suffered by enterprises. The UNICRI has recently published a study titled “Cybercrime and the risks for the economy and enterprises at the European Union and Italian level” that analyzed the impact of […]

Pierluigi Paganini February 02, 2015
BMW fixes security flaw in 2.2 million car software

A security vulnerability in the BMW Connected Drive system allowed security experts to send remote unlocking instructions to the cars. Modern cars are complex systems composed of several components interconnected by internal networks, each system within these architectures is exposed to the risk of cyber attacks. Recently the German carmaker BMW has fixed a security […]

Pierluigi Paganini January 31, 2015
PHP Applications and WordPress exposed to the Ghost flaw

PHP applications and WordPress CMS might be affected by the GHOST vulnerability that could be exploit to compromise the hosting servers. The critical GHOST vulnerability (CVE-2015-0235) in the GNU C library (glibc) may have a greater impact than imagined, security experts have discovered that PHP applications, including the popular WordPress Content Management System (CMS), could also […]