Java, Java and once again Java, the popular framework and its vulnerabilities are becoming a really nightmare for security experts, billion of users and their machines are exposed to a series of attacks that try to exploit flaws in the Oracle software. Security worldwide community attributes to the Java vulnerabilities the principal responsibilities for recent […]
When Apple revealed the hack to Reuters press agency I wrote that the last big enterprise not yet hacked was Microsoft, anticipating that was question of time. The last events have revealed how much vulnerable also major companies to cyber attacks, Facebook, Twitter and principal Press agencies such as NYT dedicate large investment to cyber […]
There is no peace for enterprises, in few weaks we have discovered how much vulnerable are giants of IT, one after another, fell the most renowned names from Facebook to Twitter, companies that we considered immune from thousands of attacks they receive each day. Until now Microsoft and Apple weren’t affected … but it’s news […]
Another blow was dealt to the authorities by a group of hackers linked to Anonymous that claims to have breached FBI security posting 1 million Apple Unique Device Identifiers (UDIDs). The UDIDs are the string of numbers that uniquely identifies each Apple device, and AntiSec hacker group has announced to have leaked more than 12 […]
We daily assist to continuous violations to user’s privacy, mobile apps that expose its data, communication channels apparently secure that reveals law enforcement interferences or network devices suspected to contains a secret backdoor. The imperative is the monitoring of users, for commercial and national security purposes, we have read in many occasions of the development […]
I find really interesting the report released by security firms regarding the principal cyber threats and the related evolution. This time I desire to share the data proposed in the by McAfee Labs in its McAfee Threats Report – First Quarter 2012. Let’s start observing that this first part of year have registered an impressive […]
Many people who do not work in our sector are asking me two questions with increasing frequency: Can a virus infect a MAC pc? Is it possible to monetize a malware development? How is it possible? Obvious my answers, we cannot think of a software system free of bugs and vulnerabilities. To those who I have […]
Yesterday I discussed with a friend and colleague Francesco on the lack of awareness of Apple’s users on malware that plague products of the house in Cupertino. This consideration is one of the reasons of the success in malware development for Apple, the users totally ignore that Apple machines are equivalent to any other kind of […]
The Wall Street Journal in recent days has published a report on the activities of the Google company against Apple’s users using the Safari browser installed on all products of the company (Mac, iPhone and iPad). It was discovered a mechanism by which Google traced and memorized every online user’s action through cookies, circumventing the […]
India, a nation technologically advanced, of which we have so much discussed in recent weeks. We have discussed about the interference of its government obsessed with desire to control private citizens, and every company operating in the domestic market. All is started with the Symantec case, the well-known manufacturer of security systems, victim of an […]