A serious flaw in the certificate verification process of GnuTLS exposes Linux distros, apps to attack. Another flaw exploitable for surveillance purposes. GnuTLS is an open source secure communications library implementing the SSL, TLS and DTLS protocols, it is used in hundreds of software packages including Red Hat desktop, all Debian and Ubuntu Linux distributions and many […]
Africa Security & Counter-Terrorism Summit in London Chaired by President of European Centre for Information Policy and Security ECIPS The Africa Security & Counter-Terrorism Summit held in London last Friday had some few hundred attendees consisting of ministers and government officials from over 28 countries. The Summit was well attended and certainly reached it goals, to find consensus among governments […]
Researchers at FireEye have developed a POC that exploits an Apple vulnerability to implement a Background Monitoring on Non-Jailbroken iOS 7 Devices. A vulnerability in Apple products is once again the center of controversy because and also in this case the user’s privacy is at risk. The excellent team of security researchers at FireEye discovered another […]
A team of researchers created in the lab the Chameleon WiFi virus, a malware that infects entire WiFi networks replicating contagion of a common cold within humans. A group of security researchers at the University of Liverpool in Britain have provided a proof of concept to demonstrate how to infect an entire WiFi network one shot. The team of researchers […]
Apple released a security update to iOS that restores some certificate-validation checks that had apparently been missing for an unspecified amount of time. Last week Apple released a security update to iOS (iOS 7.06) to fix a flaw for certificate-validation checks that could be abused by attackers to conduct a man-in-the-middle attack within the victim’s network to capture or modify […]
Hold Security reported it has discovered a list of credentials for close to 7,800 FTP servers being circulated in cybercrime forums in the Deep Web. FTP servers are considered a privileged target for cyber criminals, hackers can exploit them for example to spread malware infecting webservers that rely on FTP applications for updates. The Hold Security firm […]
An unclassified NSA memorandum disclosed by the NBC News reveals Snowden allegedly managed to access classified documentation stealing coworker’s passwords. The hypothesis that Edward Snowden has operated using a simple web-crawler is very curious, how is it possible that a lonely consultant had access to a so huge collection of documents from NSA archives? Why Does […]
Kaspersky confirms hidden threat in BIOSes PC and warns that Absolute Computrace Anti-Theft agent can be remotely hijacked.Absolute Software refuses claims. After the case raised by Kaspersky team on the Computrace agent I tried to contact Absolute software received the following official reply on the results of the investigation. Background On Wednesday, February 12th, Kaspersky Lab […]
Experts at Kaspersky confirm hidden threat in BIOSes of Popular Laptops and warns that Absolute Computrace Anti-Theft agent can be remotely hijacked Researchers at Kaspersky Lab have demonstrated that a feature in the legitimate software produced by Absolute Software firm can be abused to turn a defensive utility into a powerful utility for cyberattack. Kaspersky Lab’s security […]
Largest Ever 400Gbps Distributed Denial of Service NTP Amplification attack hits Europe servers of anti-DDoS protection firm Cloudfare. Despite the Distributed Denial of Service (DDoS) attack is a type of offensive easy to arrange, it is a very insidious threat for web services. A recent analysis revealed that the Distributed Denial of Service attack are increasing in magnitude […]