cyber security

Pierluigi Paganini April 14, 2015
Bank and vendors – Which are the threats to cyber security?

The NYDFS released a new report on the Cyber Security in the Banking Sector that highlights problems faced by almost every bank in the US with third party vendors. Last week, The New York State Department of Financial Services (NYDFS) released a report on the Cyber Security in the Banking industry, the analysis revealed several disconcerting […]

Pierluigi Paganini April 12, 2015
Security Affairs newsletter Round 4 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Firefox 37 arrives with Opportunistic Encryption support Google Internet Authority G2 has become untrusted due to an expired certificate Security Affairs newsletter Round 3 – Best of the week […]

Pierluigi Paganini March 29, 2015
Security Affairs newsletter Round 2 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Just a unicode string of 13 characters to crash Mac Chrome tab Chrome, Firefox, Safari and IE – All Browsers Hacked at Pwn2Own Competition PoSeidon the most sophisticated PoS […]

Pierluigi Paganini March 24, 2015
A Large Number of Hacking Vulnerable Routers Have Been Released to the Public

Thousands of routers exposed on the Internet by the ISPs are vulnerable to hacking and consequence of attacks on a large scale could be dramatic. ISPs have provided at least 700,000 ADSL routers to the public and unfortunately these kinds of routers have been really vulnerable to every possible hacker who wants to gain the […]

Pierluigi Paganini March 04, 2015
Weaknesses in Air Traffic Control Systems are a serious issue for FAA

A GAO report to FAA reveals that the systems adopted in the Aviation industry are still affected by weaknesses that could be exploited by hackers. A report published by Government Accounting Office (GAO) in January urges the Federal Aviation Administration (FAA) to adopt a formal process to “Address Weaknesses in Air Traffic Control Systems.” The FAA has taken steps […]

Pierluigi Paganini March 02, 2015
Hacking the hackers : A cyber resilience approach

A cyber resilience approach: the need to become cyber resilient is very essential because eliminating risks completely is impossible. Hacking emerged as a geeky, tech-oriented culture that was a little mischievous, but ultimately was about programming and finding faults or bugs in the code. It has evolved over time to become a criminal activity. The […]

Pierluigi Paganini March 01, 2015
Shadow Cloud Services a serious risk for Government Networks

Cloud Security Alliance revealed that shadow cloud service used by employees and unmanaged by IT can pose a major security problem for organizations. Last month, Cloud Security Alliance found out that shadow cloud service used by employees and unmanaged by IT can pose a major security problem for organizations. Based on the survey, mostly half […]

Pierluigi Paganini January 24, 2015
5800 Gas Station Tank Gauges vulnerable to cyber attacks

Rapid7 revealed that more than 5000 Automated tank gauges (ATGs) used to prevent fuel leaks at gas stations in US are vulnerable to remote cyber attacks. A recent research conducted by HD Moore of Rapid7 revealed a disconcerting truth, the Automated tank gauges (ATGs) used to prevent fuel leaks at more than 5,000 gas stations in […]

Pierluigi Paganini January 20, 2015
Car hacking – Progressive Dongle exposes vehicles to attacks

A security researcher demonstrated that “car hacking” is reality through the exploitation of vulnerable Can Insurance Dongle. Million vehicles at risk. Car hacking is a reality, we have discussed the topic several times and we have learned that modern vehicles have a complex internal networking infrastructure that could be subject to cyber attacks. The news […]

Pierluigi Paganini January 16, 2015
Reading the ENISA Threat Landscape report for Internet Infrastructure

ENISA published a study on the on the threat landscape and provides a list of good practices that aim at securing an Internet infrastructure assets. ENISA has published the annual analysis on the threat landscape, the document titled Threat Landscape and Good Practice Guide for Internet Infrastructure  analyzes in details the current cyber threats and […]