NIST released the draft of cybersecurity framework, which outlines how private companies can protect themselves against cyberattacks, and security breaches. The National Institute of Standards and Technology has released a draft of the cybersecurity framework for private companies and infrastructure networks as part of  President Obama’s executive order. The order has the primary goal to improve the […]
The Antivirus vendor Malwarebytes revealed that the Wroba banking trojan distributed via file sharing sites and alternative markets targeted Korean users. Today I presented at Cyber Threat Summit 2013 the topic “Modern online-banking cybercrime” and just a few hours after it is appeared the new Android banking Trojan targeting Korean banks. The number of malware […]
Google has just revealed the details on tree new technologies, uProxy, Digital Attack Map and Project Shield, to secure the web and to fight censorship. This week Google launched the Project Shield, an initiative sustained by the company to protect enterprises from DDoS attack that are becoming a serious problem for Internet infrastructures. Google is […]
Hackers are becoming a precious category of professionals also for organized crime, their effort is creating even more problems for law enforcement. A hacker illegally gained access to 60,000 servers worldwide and used them for large scam, the systems have been abused for online shopping with a stolen foreign credit card number. This time it […]
A researcher discovered a serious vulnerability in Verizon Wirelessâs Web-based customer portal that enabled anyone to download userâs SMS message history. A security researcher found a simple flaw that exposed Verizon Wireless usersâ SMS history, the critical flaw allows an attacker to access the list of SMS history viewing all the numbers of users that communicated […]
Experts Werrett and Lee demonstrated how to conduct a powerful analysis using FBStalker, a tool created to find a comprehensive amount of data on any Facebook user. Facebook, and more in general social networks, is a platform that if not properly managed could harm user’s privacy, the fact that also friends’ social behavior could have […]
Quarkslab researchers Cyril Cattiaux has revealed Apple lied when it claimed it could not intercept iMessages sent by its users. Quarkslab researchers Cyril Cattiaux revealed that it is possible to break encryption implemented in Apple’s iMessage application due the presence of a weakness in the key management process. The announcement was made during  the Hack in the Box conference […]
Arbor Networks has published a quarterly report based on data pulled from ATLAS which includes new insight into DDoS attack trends having worrying characteristics. Arbor Networks has issued the report on global DDoS attack trends for the first three quarters of 2013, the report revealed that this kind of attack still represents a serious menace for IT […]
Security firm Imperva revealed that more than 35000 websites based on vBulletin CMS have been hacked exploiting a known vulnerability. Security experts warn of a massive attack against web sites that exploits  security flaw sites powered by the forum software vBulletin. On August vBullettin authors warned on “Potential vBulletin Exploit (vBulletin 4.1+, vBulletin 5+)”. The exploits […]
Security experts at Identity Finder demonstrated that Google Chrome users are vulnerable to sensitive Data Theft because the browser stores it unencrypted. Google Chrome is today the most diffused web browser, nearly 39% of internet users have chosen it according the data proposed by StatCounter. The reason of the success behind Google Chrome is its efficiency […]