security

Pierluigi Paganini December 30, 2013
Der Spiegel – TAO hacking elite unit and NSA backdoor catalog revealed

Der Spiegel revealed that the TAO unit of NSA planted backdoors to access computers, hard drives, routers, and other devices from principal vendors. Germany’s Der Spiegel has published another disturbing article on the NSA surveillance activities, the media agency has published an internal NSA catalog that offers spies backdoors into a wide range of equipment from […]

Pierluigi Paganini December 29, 2013
eBay XSRF flaw allows attacker to make unauthorized purchases

EBay website is vulnerable to XSRF (Cross-site request forgery) attack that would allow an attacker to hijack an account and make unauthorized purchases. A new flaw has been discovered in the official EBay website, the vulnerability allows an attacker to hijack an account and make unauthorized purchases from the victim’s account. The flaw is not […]

Pierluigi Paganini December 28, 2013
Snapchat users menaced by a couple of malicious exploits

Gibson Security revealed that The ‘Find Friends’ exploit and the ‘Bulk Registration’ Exploit menace the security and privacy of million of Snapchat users. Gibson Security has recently published the details of a couple of SnapChat vulnerabilities which could be exploited by hackers respectively to massively disclose users and associated phone numbers, and enable the creation fake accounts. […]

Pierluigi Paganini December 27, 2013
Samsung Knox Android-based solution contains a serious flaw

An Israeli security researcher from the Ben-Gurion University of the Negev’s Cyber Security Labs has discovered a serious security flaw in Samsung Knox. Samsung Knox is affected by a serious flaw, the discovery was made by an Israeli security researcher, Mordechai Guri, from the Ben-Gurion University of the Negev’s Cyber Security Labs. Samsung Knox is […]

Pierluigi Paganini December 27, 2013
Bitcoin case – How cybercriminals exploit typosquatting

How cyber criminals could exploit typosquatting? The case of MtGox proposed by MalwareBytes, a fake domain used to serve malicious codes. Typosquatting, also called URL hijacking, is a common form of hacking which relies on mistakes such as typographical errors made by Internet users when typing the website address into the address bar of their browser. Should a user […]

Pierluigi Paganini December 24, 2013
RSA refused claims on NSA Relationship and encryption backdoor

RSA published a blog post to deny the accusation about secret partnership with the National Security Agency and the use of flawed algorithm in its product. A couple of days ago on Internet was spread the news that Security firm RSA has signed a $10 million contract with the National Security Agency (NSA) to maintain […]

Pierluigi Paganini December 24, 2013
NATO has constituted Cyber Response Teams

The NATO has announced to be close to launch two Cyber Response Teams to protect the infrastructures of the Alliance in the case of cyber attacks. NATO is establishing its reaction units to protect its infrastructure in case of cyber attacks, the organization will set-up exactly two teams for the purpose. NATO is considered a […]

Pierluigi Paganini December 23, 2013
Apple iOS 7 Untethered Jailbreak is available

The evad3rs team has released the untethered jailbreak for different Apple devices running running iOS version from 7.0 to 7.0.4. The evad3rs team has released the untethered jailbreak for numerous Apple devices running running iOS version from 7.0 to 7.0.4 including iPhone (4/5/5S/5C), iPad, and iPod. Device jailbreak allows removal of the limitations designed by manufacturer, the procedure […]

Pierluigi Paganini December 21, 2013
NSA paid 10M$ to RSA to insert an encryption backdoor in its solution

Last revelation based on the documents leaked by Edward Snowden is related to the allegedly encryption backdoor inserted by RSA in the BSafe software. Is it possible to insert an encryption backdoor in one of most popular cryptographic products? Probably it is just a question of money if the request came from the NSA, according […]

Pierluigi Paganini December 21, 2013
Breaking 4096-bit RSA with an Acoustic Cryptanalysis attack

Israeli Security researchers explained how to break 4096-bit RSA analyzing CPU sound emitted during decryption (Acoustic Cryptanalysis attack). Israeli Security Researchers at Tel Aviv University recently published an interesting paper titled “RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis” to explain how they have successfully broken 4096-bit RSA analyzing Computer’s CPU Sound emitted during execution of […]