Internet of Things

Millions of Routers open to attack due to a NetUSB flawMillions of Routers open to attack due to a NetUSB flaw

Millions of Routers open to attack due to a NetUSB flaw

A simple vulnerability has been uncovered in the NetUSB component, millions of modern routers and other IoT devices are exposed…

10 years ago
Cyber threats scare a society increasingly dependent on technologyCyber threats scare a society increasingly dependent on technology

Cyber threats scare a society increasingly dependent on technology

Experts estimated that between 25 to 50 billion devices will be connected to the internet by 2020 will be exposed…

10 years ago
Getting computer infections more often? You’re not alone!!Getting computer infections more often? You’re not alone!!

Getting computer infections more often? You’re not alone!!

Computer malware Infections are dramatically increasing, it is time to assume a proper security posture to protect every single note…

10 years ago
Smart city systems could become a nightmare for securitySmart city systems could become a nightmare for security

Smart city systems could become a nightmare for security

Cyber security expert Cesar Cerrudo once again is warning the IT security community on the risks related to deployment of…

10 years ago
POODLE flaw still affects hundred thousand Australian home routersPOODLE flaw still affects hundred thousand Australian home routers

POODLE flaw still affects hundred thousand Australian home routers

Security experts revealed that more than 100,000 home routers belonging to Australian households are still vulnerable to the PODDLE vulnerability.…

10 years ago
25 billion Cyberattacks hit systems in Japan during 201425 billion Cyberattacks hit systems in Japan during 2014

25 billion Cyberattacks hit systems in Japan during 2014

The National Institute of Information and Communications Technology revealed that more than 25 billion cyberattacks hit  systems in Japan during…

10 years ago
Is Bio hacking a security risk? The future is now!Is Bio hacking a security risk? The future is now!

Is Bio hacking a security risk? The future is now!

Bio hacking - technology and humans have never been so close, they complement each other. But what are the security…

10 years ago
Linux DDoS Trojan embeds RootKit componentLinux DDoS Trojan embeds RootKit component

Linux DDoS Trojan embeds RootKit component

Security experts at Avast have analyzed a new strain of DDoS trojan targeting Linux operating system dubbed XOR.DDoS which embeds…

10 years ago
Internet of Things – Security and privacy issues presented at ISACA Roma & OWASP Italy conferenceInternet of Things – Security and privacy issues presented at ISACA Roma & OWASP Italy conference

Internet of Things – Security and privacy issues presented at ISACA Roma & OWASP Italy conference

Yesterday Pierluigi Paganini presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet…

10 years ago
Smartwatch Hacked, how to access data exchanged with SmartphoneSmartwatch Hacked, how to access data exchanged with Smartphone

Smartwatch Hacked, how to access data exchanged with Smartphone

Security experts at BitDefender demonstrated how is possible to access data exchanged between a smartwatch and a smartphone via Bluetooth.…

10 years ago