The news is circulating with insistence on the net, Skype is suffering from a vulnerability that can expose its users to serious risks, due this reason it has suspended the password reset process. The Russian Blog Pixus.ru has published a post where it is described a workaround to hijack the accounts of the famous application. […]
Article published on The Malta Indipendent on October 11th 2012 Pierluigi Paganini, David Pace, Publishers of mainstream ICT news are ablaze with articles on the evolution of the âFlameâ malware targeting the Middle East region for cyber espionage purposes, and new menaces such as Gauss or Shamoon. No longer the province of deviant black-hat hackers or […]
Today a colleague alerted me on a news published on-line related to a patent obtained by Microsoft titled “CONTENT DISTRIBUTION REGULATION BY VIEWING USER” The patent could, according to some experts, a clear violation of privacy because it uses technology to gather information on user’s consumption of video content. The major concerns are related to […]
We have had many opportunities recently to discuss about zero-day vulnerabilities, their knowledge is guarantee of success for the attackers and represents in many cases the certainty to not to be discovered. The zero-day vulnerabilities are desirable for cybercrime that desires to find new ways to monetize cyber attacks, but also for state sponsored hackers […]
Concerned over rising threats online, Cyber security agents in Africa are taking a proactive step by collaborating with global network-security experts, to curb cybercriminal activities in the continent where they will share information and technical know how. Cyber security agents in Africa will gain an even better view of emerging cyber threats by working with […]
The world is holding its breath, the cyber threat is announced by the Anonymous group who has decided to celebrate November 5th in its own way, attacking a wide selection of targets. Anonymous celebrates Guy Fawkes Day, the British holiday commemorating a failed 17th-century plot to blow up British Parliament, with an incredible media operation, […]
F-Secure  security firm has recently published the âMobile threat report Q3/2012â related the past quarter that presents the mobile threat landscape, a scenario that has been characterized by Androidâs dominance. The rapid diffusion of Android devices has had the effect of increasing the number of malware developed for the famous OS,  during the third quarter […]
Last month we have discussed on the attacks conducted by the group of hackers Team GhostShell against universities all over the world.  The group Team GhostShell claimed credit for the hack of  servers of the 100 principal universities from around the world, including Stanford, Princeton Harvard, the University of Michigan and also the Italian University of Rome. […]
Do you remember the case of the Anonymous OS proposed during last months? Who developed that OS and why? Difficult to say, maybe law enforcement to track members of the collective or someone else that desired to benefit of the popularity of the group to exploit a large number of users. A similar case has […]
Last year I wrote about a new powerful surveillance system that Russian government committed to private business to implement a complex monitoring system, officially to prevent terrorist attacks against Russia. The day is come, today the system has been deployed officially to prevent on-line pedophilia but it obvious that a similar system is also able […]