Computer malware Infections are dramatically increasing, it is time to assume a proper security posture to protect every single note of a global network. Infections from malicious software — harmful code that’s also known as malware and that includes things like computer viruses and worms — are keeping repair specialists like in Kaspersky, Sophos, and […]
Cyber security expert Cesar Cerrudo once again is warning the IT security community on the risks related to deployment of flawed Smart city systems. My readers know very well the cyber security expert Cesar Cerrudo that is author of several interesting studies on smart city systems, in August 2014 he presented a research on vulnerabilities affecting […]
Security experts revealed that more than 100,000 home routers belonging to Australian households are still vulnerable to the PODDLE vulnerability. Once again, home routers are exposed to the risk of cyber attacks. This time the news is related to the Australian consumer broadband modems that resulted affected by the Poodle and Freak vulnerabilities. Many Australian households […]
Findings reveal that there is a clear lack of appropriate security measures to protect drivers of a connected car against hackers. “Findings reveal that there is a clear lack of appropriate security measures to protect drivers against hackers who may be able to take control of a vehicle or against those who may wish to […]
A group of researchers from TrapX Security demonstrated how to infiltrate home networks by compromising a Nest thermostat. We already discussed in the past of the risks related to cyber attacks against IoT devices, these smart objects are everywhere, including our homes, so they represent a privileged target for hackers. Security experts from TrapX Security demonstrated how […]
Bio hacking – technology and humans have never been so close, they complement each other. But what are the security and privacy risks? IS BIOHACKING A SECURITY RISK? Imagine a world where our day to day activities like door locking, supermarket purchases, credit card swipes and smartphone usage are replaced by just one chip embedded […]
Three German students have discovered that tens of thousands of MongoDB databases running as a service or website backend were exposed on the Internet. MongoDB is a cross-platform document-oriented database which uses JSON-like documents with dynamic schemas (BSON) improving the integration of data between different applications. MongoDB is very popular for scalability, performance and high availability, it represents […]
Security experts at BitDefender demonstrated how is possible to access data exchanged between a smartwatch and a smartphone via Bluetooth. The paradigm of Internet of Things is influencing modern society and the way it approaches the technology in everyday life. An impressive amount of Intelligent devices surround us, but often we ignore the repercussion in term of security and privacy. […]
As we look forward to 2015, it’s had to forget the complex bugs, data breaches and Privacy violations that have marred the Tech world in the ending year. Symantec Security firm now projects doom for 2015, warning that attacks will get Smarter and sharper. It’s the end of the year, a perfect time to look […]
The DNS resolver implemented in the open source TCP/IP stacks uIP and lwIP is vulnerable to cache poisoning, the flaw could be exploited to divert traffic to malicious websites. The security researcher Allen D. Householder has reported a serious vulnerability related to the uIP and lwIP DNS resolver, according to the Vulnerability Note VU#210620 it is exposed to cache […]