Researchers at Hacktive Security, an independent security consulting company, have demonstrated how much insidious could be a so a simple and crimeless large scale application. We are in the digital era, everything is connected to the large networks and applications benefit of even more complex devices that deeply interact with the owner, in this scenario […]
Today I desire to present the excellent work produced by freelance writer Gillian Holmes and the team of BackgroundCheck.org, as well know my readers I daily public only my posts, but I think that this work deserves a careful reading and I am sure will be of your benefit as it was for me … […]
Once again the security of large scale application and platform is challenged, today is the turn of Apple, in particular of its famous Apple store that according the Researchers Elie Bursztein was vulnerable for more than half year. The developer supported Apple to discovery and fix an important vulnerability that allowed to steal passwords and […]
The news of those who make a lot of noise, more than 18 million devices commercialized by Taiwanese company HTC had security flaws that could exposes users to serious risks in particular the bugs could allow the theft of information stored on the mobile and the tracking of user’s location. The vulnerabilities appear serious according […]
The charge is heavy, according to some experts, Nokia analyzes user’s traffic officially to increase performance compressing data on some of its mobile devices. According many experts the popular company is responsible of the hijacking of user’s traffic on its servers, that is the case for the Nokia Asha models, for this reason on internet […]
During 2009 it was revealed that one of the primary defense contractor BAE Systems was hacked causing the exposure of sensible information on F-35 fighter jet. The reserved information were obtained by a group of hackers who accessed to internal server of the contractor, but BAE Systems admitted it only in 2012. The attackers were […]
Article published on The Malta Indipendent on December 9th 2012 Technology in the last decade has assumed a fundamental role in our daily lives. We are increasingly surrounded by discrete intelligent components designed to provide us with more sophisticated choices designed to enhance our personal experience and quality of life. From our phones, to our home […]
No peace for mobile environment that due its impressive increase is attracting cyber criminals and hackers like never before. The researcher Atul Alex has presented at last edition of International Malware Conference (MalCon) how it is possible to attack every mobile devices with a special hardware designed using common electronic components. Atul Alex presented a […]
Today a colleague alerted me on a news published on-line related to a patent obtained by Microsoft titled “CONTENT DISTRIBUTION REGULATION BY VIEWING USER” The patent could, according to some experts, a clear violation of privacy because it uses technology to gather information on user’s consumption of video content. The major concerns are related to […]
Trend Micro has released the report “3Q 2012 SECURITY ROUNDUP -Android Under Siege: Popularity Comes at a Price” that presents a worrying trend for malware growth increased of 483%. The increment include cyber espionage malware and also destructive malicious agents targeting mainly the mobile world and in particular Google Android platform. Malware targeting Android platform increased […]