Digital ID

Pierluigi Paganini January 28, 2016
Tails 2.0 is out to protect your privacy and anonymity

Tails 2.0 is available for download, it implements new features, including security improvements. Speaking about privacy and operating system, we are obliged to mention the popular Debian-based distribution Tails “The Amnesiac Incognito Live System.” Now the version 2.0 is available online! Tails is a popular live operating system specifically designed to protect user privacy and […]

Pierluigi Paganini January 25, 2016
Apple can access your encrypted iMessages

Apple is not able to read messages sent between devices through iMessages but it is still able to access data in the backups. Let’s do a summary of previous events, following the Snowden‘ revelation of the global surveillance programs operated by the NSA the IT giants reacted defending their business and announcing the defense of the privacy of […]

Pierluigi Paganini January 24, 2016
Skype – IP will now be hidden by default to avoid attacks

Skype announced it will hide the user’s IP address, the new security feature is enabled by default in the latest update provided by the company. Skype now hides users’ IP addresses, a measure implemented to protect them against attacks from online trolls. Skype announced the security feature this week in a blog post, the feature is […]

Pierluigi Paganini January 22, 2016
RSA Conference registration page asks Twitter credentials, that’s incredible!

It is hard to believe but the RSA Conference registration page is collecting Twitter credentials sending them back to an RSA server, in-security by design! Security experts from Twitter recently made a singular discovery, the final step of the registration page on the RSA Conference website was requesting user’s Twitter credentials and sending them to the […]

Pierluigi Paganini January 20, 2016
Which are the worst passwords of 2015?

SplashData has published its fifth annual report on most used passwords in 2015, including the list of the Worst passwords of the year. For the fifth time, experts from the SplashData security firm have published a report, titled “Worst Passwords of 2015”  that analyzes the use of passwords in 2015. The researchers compiled the annual report with data […]

Pierluigi Paganini January 19, 2016
A new archive of US voting records appeared on the Dark Web

A new archive containing alleged voting records of millions of US citizens is available on a hidden service on the dark web. Joseph Fox from Motherboard discovered alleged voting records of millions of American citizens on a website in the dark web. The data were published on a website linked to a notorious cybercrime forum, […]

Pierluigi Paganini January 17, 2016
LastPass phishing attack could allow attackers to steal your passwords

At the recent ShmooCon conference a researcher presented a LastPass phishing attack that could allow hackers to steal your password. We discussed several times the importance of password managers such as LastPass, but sometimes hackers could exploit them to launch their attacks. The security researcher Sean Cassidy has presented on Saturday at the ShmooCon hacker conference […]

Pierluigi Paganini January 16, 2016
Senior Bitcoin developer expects a failure of the currency

Mike Hearn explains that the fundamentals are broken and the price the long term trend should probably be downwards. Mike Hearn, a senior Bitcoin developer explained the failure of the Bitcoin cryptocurrency as experiment and announced he has stopped working on it and sold his coins. Hearn blamed the community for the failure, according to the […]

Pierluigi Paganini January 13, 2016
How to convert 30$ D-Link DCS web cameras into a backdoor

A group of researchers from Vectra Threat Labs explained how to exploit IoT devices like 30$ D-Link DCS web cameras as a backdoor. Vectra Threat Labs, part of Vectra Networks has invested time testing some IoT solutions available in the market, and one of the most interesting products its always the Wi-Fi security web cameras. […]

Pierluigi Paganini January 12, 2016
A research team has found two flaws in the OAuth 2.0 protocol

According to a group of researchers from the University of Trier two critical flaw affects the oAuth 2.0 authentication protocol. The OAuth 2.0 authentication protocol is widely used on social networking sites, every day billion of users access their profiles on Facebook and Google+ using it. According to researchers Daniel Fett, Ralf KĂŒsters and Guido […]