encryption

Pierluigi Paganini December 06, 2015
EFF Scoreboard – Secure Messaging, stay safe online

Learn more about the EFF scoreboard for secure, encrypted communication options online and what the future holds. Online communications have been increasing rapidly over the past few years. However, there are many incidents revealing Internet surveillance. If you think of Edward Snowden and the revelations that he had brought to the public about NSA and […]

Pierluigi Paganini December 03, 2015
The Signal app is available in beta version

Open Whisper Systems  issued a beta version of the Signal app for Desktop that for now works only as a Chrome app and links only to Android devices. Signal is a free and open-source encrypted voice calling and instant messaging application for mobile devices. It runs on both iOS and Android and uses advanced end-to-end encryption […]

Pierluigi Paganini November 27, 2015
VPN users be aware , Port Fail flaw can reveal your identity

Security experts at the VPN provider Perfect Privacy discovered a new vulnerability dubbed Port Fail that could be exploited to de-anonymize VPN users. Security experts at the VPN provider Perfect Privacy discovered a new vulnerability dubbed Port Fail which affect all VPN (Virtual Private Network) protocols and operating systems. An attacker can exploit the Port Fail flaw […]

Pierluigi Paganini November 23, 2015
TrueCrypt is safer than previous examinations suggest

A new security audit the TrueCrypt software confirmed that even if it is plagued by some vulnerabilities, the application is effective when it comes to protecting data. TrueCrypt, secure or insecure … that is the question. A group of Ten auditors from the Fraunhofer Institute for Secure Information Technology has conducted a six-month audit of TrueCrypt […]

Pierluigi Paganini November 18, 2015
Discovered instances of the ISIS Help Desk that support terrorists worldwide

The IS is running service to assist jihadists to use encrypted communications and much more. NBCreports defined the service a 24-hour ISIS Help Desk. The propaganda machine of the ISIS is very efficient, everytime that intelligence and activism, try to block it, it rapidly changes become even more effective. After the Paris attacks, we discussed […]

Pierluigi Paganini November 18, 2015
Anonymous has taken down 5,500 ISIS accounts

The collective of hackers Anonymous claimed Tuesday to have taken out 5,500 Twitter accounts used by the Islamic State organization. The hacking collective Anonymous launched the operation #OpParis against the ISIS in response to the dramatic Paris attacks. The hackers belonging to Anonymous are targeting social media accounts used by members of the terrorist organization. Anonymous released […]

Pierluigi Paganini November 05, 2015
Offline Ransomware is spreading among Russian users

Malware researchers at Check Point Technologies have discovered a new offline ransomware that is targeting mainly Russian users. Malware researchers at Check Point Technologies have spotted a new “offline” ransomware that is targeting Russian users. The principal characteristic of this strain of malware is that it doesn’t need to communicate with a command and control […]

Pierluigi Paganini October 31, 2015
The surveillance firm Hacking Team is back stronger than before

Motherboard has obtained a non-public email sent by the Hacking Team CEO to its customers that announce a new generation of hacking tools. Hacking Team is the popular surveillance company that suffered a serious data breach this year. More than 400 GB of its sensitive data were exfiltrated from the Italian company, including internal emails, zero-day exploits, surveillance […]

Pierluigi Paganini October 28, 2015
The US DoD still uses SHA-1 signed certificates for use by military agencies

The United States Department of Defense is still issuing SHA-1 signed certificates for its military agencies, despite they are considered insecure. Today I have published a blog post on the Army Vulnerability Response Program (AVRP), a sort of bug bounty program specific for the US military environment. The idea is to incentive  the ethical disclosure of vulnerabilities […]

Pierluigi Paganini October 24, 2015
How to improve Internet security after the disclosure of the Diffie-Hellman flaw

Now that it is known a critical flaw in the Diffie-Hellman key-exchange protocol was exploited by the NSA to break the internet encryption, how to stop it? Recently a group of researchers has revealed how the NSA has cracked HTTPS, SSH, and VPNs rely on the Diffie-Hellman encryption by exploiting a wrong implementation of the cryptographic algorithm. The […]