Chaos Computer Club claims to have bypassed the biometric security technology Apple TouchID by making a copy of a fingerprint photographed on a glass surface. Hackers members of the Chaos Computer Club claim to have defeated Apple TouchID fingerprint sensor for the iPhone 5S, just after the start of its sale to the public. The Chaos Computer Club in […]
Microsoft Security Advisory reveals a vulnerability in Windows Phone OS that could allow information disclosure Microsoft has issued a security advisory related to a vulnerability in Windows Phone OS that could allow information disclosure, the flaw is related to Wireless PEAP-MS-CHAPv2 Authentication used by Windows Phone to access to wireless network. According the Microsoft Security Advisory (2876146) a hacker exploiting […]
Security expert Ebrahim Hegazy has found a Password disclosure vulnerability in Barracuda update servers which allows to gain access to employee credentials. The cyber security Analyst @Qcert Ebrahim Hegazy(@Zigoo0) has found a Password disclosure vulnerability in one of Barracuda update servers which allows the attackers to gain access to all its employee data. When the system administrator needs to […]
Brute forcing applications spotted in the wild demonstrates the continual interest of cybercrime … What is the limitations of this attack technique? Cybercrime industry has a fervent creativity and  new products are daily offered in the underground. I desire to close this week with a look to the offer on the black market speaking of brute-forcing applications […]
The purpose of this article is to cover the challenges SMBs are facing when it comes to using authentication methods to protect their online websites and applications, and comparing a number of two factor authentication services for SMBs. The report includes: –Â Â Â Â Â Â Â Â Â Why âpassword onlyâ protection is not enough anymore –Â Â Â Â Â Â Â Â Â The challenges of […]
Adoption of a two-factor authentication process is necessary  to increase the robustness for authentication processes, but security is a process that must be cured at 360 degrees. Twitter finally deployed two-factor authentication to improve security of a userâs account, this is the response of popular social network to the various incidents occurred to some of […]
Recently hackers have intensified the number of attacks against corporate social media accounts, the Twitter account is most targeted ones due the high interest of businesses in this comfortable communication channel. Various the companies that have recently been hacked on Twitter including 60 Minutes, 48 Hours and a Denver news affiliate, The New York Times, […]
Any owner of WordPress site is shaking causes of the threat that someone could steal its credentials, everybody would do well to ask themselves if their passwords are really strong and to make sure to donât use as username the word âadmin.â The reports published by CloudFlare and HostGator revealed a massive attack being launched against WordPress blogs […]
In the last weeks we discussed on the efficiency of exploit kits, malicious tool kits  that allow to the attackers to exploit a huge quantity of vulnerabilities in victims systems. These products are largely diffused in the underground where is possible to find different tools usable for various purpose, most precious are those kit that […]
Today I desire to discuss about a very interesting study by Solutionary’s Security Engineering Research Team (SERT) that shared the results related an analysis on malware and exploit kits diffusion observed with its solution ActiveGuard service platform. The platform has collected and analyzed malicious events that hit company clients globally, the data have been provided […]