The purpose of this article is to cover the challenges SMBs are facing when it comes to using authentication methods to protect their online websites and applications, and comparing a number of two factor authentication services for SMBs. The report includes: – Why ‘password only’ protection is not enough anymore – The challenges of […]
Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and in general of mobile cyber threats. Mobile botnets are malicious infrastructures that are increasing with impressive trend especially the Android botnets, considering the capillary diffusion for the Google mobile OS. Android devices are in the hands […]
Checkmarx’s report analyzed the security of the top 50 most popular plugins (in general), as well as the top 10 most popular ecommerce plugins. Today we published our report “The Security State of WordPress’ Top 50 Plugins” (no reg required). This report presents Checkmarx’s research which analyzed the security of the top 50 most popular plugins […]
Stellar Wind, Prism,EvilOlive, ShellTrumpet are the names of some of the US massive surveillance programs revealed recently by the press … The Guardian published new uncomfortable documents that revealed another surveillance program dubbed Stellar Wind that was started in 2001, after the tragic events of 9/11. According to the secret documents obtained by the Guardian, the program was authorized by President George W. […]
Chinese hackers Comment Crew is changing tactics, security firms suspected it due the analysis of principal cyber espionage campaigns targeted their clients. The Comment Crew is back again, security experts suspect the involvement of the Chinese group of hackers in the cyber dispute between U.S. and China. In February The Mandiant Intelligence Center™ released an interesting report […]
Car hacking is today possible due the massive introduction of technology in our vehicles, a hacker that gain access to our vehicles. Car hacking is one of the effect of the massive introduction of technology in our vehicles, a hacker that gain access to our transport is an event that we have seen only in […]
Attacks-as-a-Service, Malware-as-a-Service and Fraud-as-a-Service, are all terms used to better qualify the complex evolution of cybercrime offer. Attacks-as-a-Service , Malware-as-a-Service and Fraud-as-a-Service are all terms commonly used for providing of illegal activities by cyber criminals. These models of sale represent the natural evolution of the offer in the underground that responds to a demand in constant growth. In the past we have discussed […]
The energy sector is threaten with increasing frequency by hacktivists, state-sponsored hackers and cybercriminals… The number of cyber attacks against energy sector is increased creating great concerns within the security community. Oil and gas firms are subject to continuous offensives moved by hacktivists and state-sponsored attacks, their activities are crucial for any country and due this reason are considered privileged targets. […]
Operation Tempora, is the name of GCHQ program to tap fibre-optic cables for secret access to communications. Operation Tempora, this is the name of last massive tapping program conducted by Britain’s Government Communications Headquarters (GCHQ) and revealed by The Guardian. Operation Tempora has been going on for at least 18 months, British intelligence adopted “intercept probes” […]
Network security engineer “Richee” explained how to use a Raspberry Pi to realize a physical backdoor to gain remote access to an office network. Network security engineer “Richee” published an interesting post on how to use a tiny Raspberry Pi computer to obtain physical access into a corporate network. I decided to publish this post because […]