Reflession on the necessity to adopt a shared regulatory for the security of critical infrastructure. Eugene Kaspersky point of view on the topic. Security of critical infrastructure is a critical urgency of any government, the NIST announced the Framework for Improving Critical Infrastructure Security, a document that proposed cybersecurity standards and practices to build out a security program. The cybersecurity […]
Unflod Baby Panda is the name of a new mobile malware which is targeting jailbroken versions of Apple iPhone. The threat seems to have China origin. The number of cyber threats against mobile users is in constant increase, on the other hand bad habits like the practice of jailbreak/root the devices and the lack of […]
BlackBerry issued an alert on a remote code execution vulnerability in qconnDoor service that affects BlackBerry 10 smartphones. A recent BlackBerry Security Advisory informed users of the existence of a remote code execution vulnerability (CVE-2014-1468) that affect BlackBerry 10 smartphone running OS versions earlier than version 10.2.0.1055. As described in the advisory the attackers could exploit the vulnerability sending […]
The end of support for Windows XP OS is at hand, the consequences could be serious for specific industries and in counties where the OS is dominant. Timing is running out for Windows XP because the end of support is very close, tomorrow, April 8th 2014, the support for the popular OS will end. After 12 years, support for Windows […]
A security student has discovered a method to fly for free across Europe by generating fake boarding documents designed for Apple’s Passbook app. A 18 year-old security student, Anthony Hariton (@DaKnObCS), from the University of Crete in Greece, has announced that he will present next month a technological trick to fly for free across Europe by generating […]
A new iOS 7 bug allows anyone to disable Find My iPhone feature and to bypass Activation Lock without user’s Apple credentials. HAckers can bypass Find My iPhone feature, a new bug menaces the security of Apple iPhone users, a flaw recently discovered in iOS 7.1 allows thieves to disable Find My iPhone feature, remove iCloud […]
A group of researchers from Johns Hopkins University discovered that a second NSA tool aggravate the RSA security software’s vulnerability. We all remember the Snowden‘s revelations regarding the support provided my RSA Security, a division of EMC company, to the NSA Intelligence. Snowden accused the RSA to have deliberately inserted an alleged encryption backdoor in […]
The Global Threat Intelligence Report (GTIR) addresses the security challenges of organizations globally analyzing 3 billion worldwide attacks occurred in 2013. The NTT Innovation Institute has released the new Global Threat Intelligence Report (GTIR), a document structured to raise awareness of the rapidly evolving global threat landscape. The GTIR was based on threat intelligence and attack data from […]
Security experts at Rapid7 firm have public disclosed a series of flaws affecting several thousands of critical infrastructure using Yokogawa software. Several thousands of critical infrastructure may still be vulnerable to SCADA flaws public disclosed this week. It has been estimated that more than 7,600 different chemicals, power and petrochemical plants are affected by the bugs disclosed […]
A security consultant disclosed a security flaw in WhatsApp which can be exploited to gain access to the private chats of Android device owners. The recent acquisition of WhatsApp by Facebook has done much to discuss, ever a price so high was paid for an app, but major concerns relate to users’ privacy. The security consultant Bas Bosschert […]