security

Pierluigi Paganini March 17, 2015
OpenSSL announced fix for mystery high critical vulnerability

New versions of OpenSSL will be released on Thursday to patch critical security vulnerabilities, one of which is considered very dangerous. The OpenSSL Project Team announced in an advisory published on Monday that new versions of OpenSSL will be released on Thursday to patch several security vulnerabilities. The disconcerting news is that at least one of them […]

Pierluigi Paganini March 17, 2015
Yahoo launches its on-demand password feature

Yahoo announced its new on-demand password feature that lets users into login in their account with a code sent to their mobile phone. Yahoo has announced a new Password-Free login feature to let users access their account without the need for a password. When users will sign in his account, an on-demand password is sent to a […]

Pierluigi Paganini March 17, 2015
Cardless ATMs will improve security of cash withdrawal

A unit of Canada’s Bank of Montreal will launch on Monday its network of cardless ATMs, a technological innovation to improve users’ security. Recently we have discussed different kinds of attacks against ATM machines, the majority of which were conducted by exploiting hardware skimming. Black box attacks and malware based attacks are a few sample of methods recently observed […]

Pierluigi Paganini March 14, 2015
2,400 unsafe applications found in average large enterprise

A recent study published by Veracode on mobile security revealed that 2,400 unsafe applications are in average installed in large enterprise. Mobile devices are becoming an integral part of the enterprise architecture, security depends heavily on the use that is made with mobile devices and from the policies adopted to protect the company from cyber […]

Pierluigi Paganini March 11, 2015
Apple and Microsoft released updates to fix the FREAK flaw

Microsoft and Apple released security updates to fix the FREAK vulnerability recently discovered and affecting their products. FREAK is a major security flaw recently discovered that left users of Apple and Google devices exposed to MITM attack while visiting supposedly secure Websites. At the same time Microsoft issued a specific security advisory to inform its […]

Pierluigi Paganini March 08, 2015
Hacking home networks by compromising a Nest thermostat

A group of researchers  from TrapX Security demonstrated how to infiltrate home networks by compromising a Nest thermostat. We already discussed in the past of the risks related to cyber attacks against IoT devices, these smart objects are everywhere, including our homes, so they represent a privileged target for hackers. Security experts from TrapX Security demonstrated how […]

Pierluigi Paganini February 27, 2015
Tor Browser 4_0_4 Release improves security and privacy

The Tor Project has announced a new version of Tor Browser Bundle, Tor version 4.0.4, that improves privacy and security features. The Tor Project has announced a new release of the Tor Browser Bundle, Tor Browser version 4.0.4, that improves privacy and security features implemented by the popular anonymizing software. The Tor Browser is used by Internet users […]

Pierluigi Paganini February 16, 2015
New Studies Proving Non Immediate Reaction of Antivirus Tools to Threats

It has been outlined that most antivirus software do not detect all the malware and other threats that they should, leaving room for infection and motivating companies to look deeper for more effective solutions to the problem of online security. The safety of an internet user against a threat of a virus infection is analogous […]

Pierluigi Paganini February 14, 2015
EU parliament bans the Microsoft mobile Outlook app

The experts at the IT Department of the EU parliament bans the Microsoft mobile Outlook app due to the recently disclosed privacy and security issues. A few day ago I wrote about serious security issues for day ago I wrote about serious security issues for Microsoft mobile Outlook app, the researcher and Head of Development at midpoints […]

Pierluigi Paganini February 08, 2015
The GHOST vulnerability is a threat to critical business applications

Researchers at Veracode discovered that nearly 41% of enterprise applications using GNU C Library employ the Ghost-ridden ‘gethostbyname’ function. GNU C Library (glibc) vulnerability, named as the GHOST vulnerability, was released by Qualys Guard on 27th January 2015. Severity of this vulnerability is “CRITICAL” and listed in CVE database as CVE-2015-0235. Vulnerability is termed as […]