According to a new series of reports published by Secunia firm, Oracle Java poses the biggest security risks to Desktop machines in the US. According to the a new report published by Secunia security vendor, Oracle Java software represents the principal source of problems for private US desktops, followed by Apple Quicktime 7.x. Oracle Java is […]
A Swedish security expert has discovered a serious  privilege escalation vulnerability in last Apple operating system, the OS X Yosemite. A Sweden white-hat has found a serious security flaw in Apple Yosemite OS X that could be exploited by an attacker to take control of your PC. The Swedish hacker Emil Kvarnhammar at security firm Truesec discovered a privilege […]
According to a UK motoring industry group and authorities keyless cars ‘increasingly targeted by thieves, which are using computers e dedicated equipment. According to a UK motoring industry group, criminal organizations are increasingly targeting high-end cars with keyless security systems.  The Society of Motor Manufacturers and Traders (SMMT) confirmed that car thieves are using dedicated equipment to access […]
The security researcher Michal Zalewski revealed the details of other two additional bugs he discovered in the Bourne Again Shell after the Bash Bug case. IT community worldwide has been shocked by the discovery of the Bash Bug flaw, a vulnerability that was present in the popular Bash component for more than two decades. While principal […]
A CSRF (Cross-site request forgery) vulnerability affects the Fiverr.com website, millions users are potentially at risk. The Egyptian Information Security Evangelist, Mohamed Abdelbaset, reported to the colleagues of The Hacker News a serious CSRF (Cross-site request forgery) vulnerability on the popular Fiverr website. The Fiverr.com website is a marketplace where people offers their services for five dollars per […]
Experts at Palo Alto Networks uncovered a new Nigeria 419 scam scheme which is targeting businesses in a malicous campaign dubbed Silver Spaniel. The Nigeria 419 schema adopted by criminal gangs world wide has been improved by scammers which are also including the use of remote access trojans (RATs). A report published by the Palo […]
A new series of vulnerabilities in Linux Kernel allows an attacker to lead DoS and privilege escalation attack, Debian urges upgrades for Linux users. Numerous security flaws have been discovered and fixed in the Linux kernel, patch management for these vulnerabilities is critical to avoid that attackers could have led to a denial of service […]
The Federal Trade Commission debated on the privacy ramifications of consumer generated and controlled health data, following data on mobile apps. The Federal Trade Commission has recently released the disconcerting results of a study conducted on 12 mobile health and fitness apps, focusing the analysis on the way they manage users’ personal information. Let me anticipate that […]
Security experts Cesar Cerrudo conducted a study on the security of components within control traffic lights and similar electronic systems. The hacking of control systems for traffic lights or cyber grids is a prerogative of sci-fi series and movies, hackers could be able to target them causing serious problems. Cesar Cerrudo, CTO at IOActive, has conducted a study to investigate […]
The NIST announced it will request final public comments before Dual_EC_DRBG generator is officially removed from NIST Special Publication 800-90A, Rev.1 The National Institute of Standards has decided to abandon Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG ) in response to the controversy raised after the revelation made by Edward Snowden. In December the whistleblower leaked […]