Security

Pierluigi Paganini February 14, 2015
Obama signed a new Executive Order on sharing cyber threat information

The US President Obama has recently announced a new Executive Order Promoting Private Sector Cybersecurity Information Sharing. Cyber security is a primary goal for the President Obama’s administration, aligned with national cyber strategy, the American President has signed a new Executive Order to promote the sharing of cyber threat information among private sector organizations and […]

Pierluigi Paganini February 14, 2015
EU parliament bans the Microsoft mobile Outlook app

The experts at the IT Department of the EU parliament bans the Microsoft mobile Outlook app due to the recently disclosed privacy and security issues. A few day ago I wrote about serious security issues for day ago I wrote about serious security issues for Microsoft mobile Outlook app, the researcher and Head of Development at midpoints […]

Pierluigi Paganini February 13, 2015
Discovered 40000 vulnerable MongoDB databases on the Internet

Three German students have discovered that tens of thousands of MongoDB databases running as a service or website backend were exposed on the Internet. MongoDB is a cross-platform document-oriented database which uses JSON-like documents with dynamic schemas (BSON) improving the integration of data between different applications. MongoDB is very popular for scalability, performance and high availability, it represents […]

Pierluigi Paganini February 13, 2015
More than 16 million mobile devices are infected worldwide

A recent study published by Alcatel-Lucent’s Motive Security Labs reported that 16 million mobile devices worldwide have been infected by malware. Security experts noticed a significant increase in cyber threats to mobile and residential devices and attacks on communications networks in 2014. A growing number of sophisticated attacks are threatening personal and corporate information representing a serious […]

Pierluigi Paganini February 11, 2015
US Government Launching New Cyber Threat Intelligence Integration Center

US government is launching the Cyber Threat Intelligence Integration Center for the co-ordination of all other departments and improving of cybersecurity. US government will create a new center which is going to co-ordinate all the other units that work towards providing a more effective defence against cybercrime. The new center will fill the gaps that […]

Pierluigi Paganini February 10, 2015
Memex – The new search tool to dig also in the Deep Web

DARPA has publicly presented for the first time a new set of search tools called Memex which will improve also researches into the “Deep Web”. In 2014, the U.S. Defense Advance Research Projects Agency (DARPA) launched a the MEMEX project to design advanced search tools that could be also used to scan the deep web, which isn’t indexed by […]

Pierluigi Paganini February 09, 2015
WhatsSpy Public tool can spy on Whatsapp users

WhatsSpy Public is a web-based tool that could allow an attacker to access Whatsapp user information related to his activity. WhatsSpy Public is a web-based tool created by Maikel Zweerink that can trace the moves of a WhatsApp user. WhatsSpy is able to display user information in a friendly dashboard that includes events being displayed […]

Pierluigi Paganini February 08, 2015
The GHOST vulnerability is a threat to critical business applications

Researchers at Veracode discovered that nearly 41% of enterprise applications using GNU C Library employ the Ghost-ridden ‘gethostbyname’ function. GNU C Library (glibc) vulnerability, named as the GHOST vulnerability, was released by Qualys Guard on 27th January 2015. Severity of this vulnerability is “CRITICAL” and listed in CVE database as CVE-2015-0235. Vulnerability is termed as […]

Pierluigi Paganini February 08, 2015
Samsung SmartTV models transmit voice, and more, to a third-party service

Samsung SmartTV transmits data to a third party, be aware that if your spoken words include personal or other sensitive information. We have discussed several times about the privacy and security issues related to the Internet of Things devices, Smart meters and Smart TV are intelligent devices that could be exploited by hackers to collect our sensitive […]

Pierluigi Paganini February 07, 2015
11 percent of mobile banking apps includes harmful code

A recent study published by RiskIQ security firm revealed that more than 11 percent of mobile banking apps includes harmful code. With the rapid spread of mobile banking services has increased significantly the number of cyber crimes targeting users of major financial institutions. According to an interesting research conducted by the company RiskIQ more than 11 […]