search

Date range
Filters

1196 results

Pierluigi Paganini September 30, 2015
Does Mr. Robot’s use real Hacking Tools? Which are?

Check out the hacking tools used by Mr. Robot and see why the display of these tools is as realistic as possible. Mr. Robot has been the breakthrough of summer for series lovers, especially for those who are fans of technology and computing. One of the major advantages of Mr. Robot over other series has […]

Pierluigi Paganini September 28, 2015
Uber is facing problems with Chinese fraudsters

Nasty surprise for Uber users who have found themselves credited several rides through the streets of China, the company is investigating on the cases. A nasty surprise for Uber users who have found themselves credited several rides through the streets of China. Unfortunately, fraudsters have targeted Uber to take free rides, in the following picture […]

Pierluigi Paganini September 27, 2015
Security Affairs newsletter Round 28 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. AVG will sell user’s personal data to third-parties A string could be used to crash Google Chrome Pentagon on manual mission to build nation-wide security database Tech finds 1.5M […]

Pierluigi Paganini September 27, 2015
Aerospace Probes released to stratosphere for spying weapons

A group of hackers is launching aerospace probes in the aim of spying on governments and organizations by collecting signals in the stratosphere. A group of techies has recently created and tested an aerospace probe, so as to help gather a lot of data deriving from communication, leading to a whole new concept of how […]

Pierluigi Paganini September 24, 2015
Data breaches, stolen data and their sale in the Dark Web

Trend Micro published a report that explains the dynamics triggered by data breaches, following data from the incidents to their offer in the Dark Web. Trend Micro published a report that explains the dynamics triggered by data breaches, following data from the incidents to their offer in the Dark Web. Stolen data is a precious commodity […]

Pierluigi Paganini September 18, 2015
The Differences between Targeted Attacks and Advanced Persistent Threats

Although Advanced Persistent Threats and Targeted Attacks are often confused, in their core these are two different things in the field of online security. Most businesses out there need only worry about one of these two types of attacks, focusing their efforts to remain thoroughly protected against both enemies and threats. Many people get confused over […]

Pierluigi Paganini September 09, 2015
Many HTTPs sites at risk of revealing their private keys because of a critical bug

A number of recent discoveries suggest as more HTTPs websites, chat applicationss, and other services online are actualizing perfect forward secrecy. As per a Red Hat (a Linux distributor) security specialist, system equipment sold by few makers neglected to appropriately execute a broadly utilized cryptographic standard, an information releasing weakness that can permit spammers to […]

Pierluigi Paganini September 08, 2015
Hundreds million legit websites could serve Ransomware because of Script Injection compromise

Heimdal Security published an interesting post on the increase in malicious scripts that are being injected into legit websites in order to serve ransomware. Heimdal Security recently published an interesting blog post on the increase in malicious scripts that are being injected into legit websites in order to serve malware. The attackers compromise websites running […]

Pierluigi Paganini September 03, 2015
Dark Web intelligence pro and cons

Dark Web Intelligence could help law enforcement and intelligence agencies to gather information on potential attacks. Which are the risks? The increased number of cyber attacks against government entities and the hypothesis that the U.S. government should take an offensive strike against hackers who hit the countries raised the discussion on the problem of the attribution. Prevention, mitigation and […]

Pierluigi Paganini September 02, 2015
US weighs sanctioning China and Russia in response to recent cyber attacks

The Obama administration weighs sanctioning China and Russia in response to recent cyber attacks who have exposed sensitive data of the US Govt and US firms. The US Government is considering sanctions against both Russian and Chinese hackers in response to the hacking campaign targeting US entities. The news was reported by several U.S. officials yesterday who […]