security

Pierluigi Paganini June 20, 2015
Evolution of 3D Printing Technology Raises Security Concerns

This post is an excerpt from the article titled “Evolution of 3D Printing Technology Raises Security Concerns” available on the Infosec Institute. Also known as the term additive manufacturing (AM), 3D printing is a process for making a three-dimensional object of almost any shape starting from a 3D model or other electronic data source. Through […]

Pierluigi Paganini June 08, 2015
MEDIJACK – How cyber criminals violate health care systems

TrapX, a renowned security providing delivery of deception based cybersecurity  defense uncovered a security flaw in medical field dubbed as medical device hijack, or simply put MEDIJACk. The flaw can allow attackers to exploit main healthcare systems by breaking into the unpatched and outdated medical devices. Let it be Anthem hack or CareFirst BlueCross BlueShield, this year has […]

Pierluigi Paganini May 31, 2015
The Importance of Operational Security and User Education

An overview of the principal issues related to the 3 general categories that security controls fall under; physical, technical, and operational controls. What is Layer 8? Layer 8 is a term utilized by information security professionals and techies in general that represents the weakest link of every organization: the users.  While an organization may be […]

Pierluigi Paganini May 21, 2015
A large number of websites and web services affected by the LogJam TLS flaw

Researchers have discovered a new  TLS vulnerability dubbed LogJam that open a large number of online services to cyber attacks. Logjam is the name assigned to a new vulnerability that affects the Transport Layer Security (TLS) protocol putting a large number of online services at risk. Logjam vulnerability can be triggered through man-in-the-middle (MitM) attacks to […]

Pierluigi Paganini May 20, 2015
Airbus – Be aware a software bug in A400M can crash the plane

The crash of the Airbus A400M military transport in Spain was caused by a software bug, three engines were shut down immediately after the start due to the flaw. Recently we have discussed a lot about the possibility to hack a plane, almost everyone has read about the computer security researcher Chris Roberts which reported the […]

Pierluigi Paganini May 19, 2015
How hackers use Robots txt to harvest information

The penetration tester Thiebauld Weksteen has published an interesting analysis to explaine the importance of robots.txt for the hacking activities. Thiebauld Weksteen, a penetration tester from Melbourne is advising system administrators that robots.txt can give precious details to hackers, when it comes to attacks, because robots.txt as the capability to tell search engines which directories […]

Pierluigi Paganini May 16, 2015
Polish firm disclosed PoC code for security issues in Google App Engine

Security researchers at Security Explorations firm have published PoCs code for some of security issues in the Google App Engine. The Polish firm Security Explorations has published online the technical details and a proof-of-concept code for security flaws affecting the Google App Engine (GAE) for Java. “Security Explorations decided to release technical details as well as […]

Pierluigi Paganini May 15, 2015
Combo Breaker, a DIY tool to easily crack many Master padlocks

The security expert Samy Kamkar after the disclosure of a method to easily crack many Master padlock combinations designed Combo Breaker to mechanize it. A couple of weeks ago, the popular security expert Samy Kamkar revealed a method to easily crack many Master padlock combinations in eight tries or less. Unfortunately, it is not so complicated to […]

Pierluigi Paganini May 12, 2015
How quantum computing will improve credit card security

Quantum computing in credit cards introduces a new type of encryption (quantum cryptography) that will make magnetic strips and EVS solutions obsolete. Nowadays getting credit card credentials it’s not difficult and you don’t need to have technical skills, you can just buy them in the dark web, but that’s may change in the future thanks […]

Pierluigi Paganini May 09, 2015
Facebook Friends Mapper – How to crawl Hidden Friends

Hackers have a new tool in their arsenal dubbed Facebook Friends Mapper that allows them to crawl Facebook Hidden Friends list just in a click. Facebook users can protect their privacy by setting the “privacy level” for every information related their profile or content they post online. Users can decide to completely set as private the information in […]