Security

Pierluigi Paganini September 09, 2015
Israel is the main source of cyber attacks on Iran

According to a recent report issued by the Mehr news agency, more than 10,000 cyber attacks are detected by Iran every day, mostly from Israel. According to a recent report, more than 10,000 Internet security attacks are detected by cyber security experts in Iran every day, a country that is spending a significant effort to improve […]

Pierluigi Paganini September 09, 2015
Hacking driveless-cars using a simple Laser and a Raspberry Pi

The security researcher and scientist Jonathan Petit claims to be able to hack a driveless-cars by using a simple Laser and a Raspberry Pi. Driverless-cars are the final goal of the principal car manufacturers that are working on several projects to introduce this new revolution in the automotive. Lexus, Mercedes and Audi are just some […]

Pierluigi Paganini September 09, 2015
Many HTTPs sites at risk of revealing their private keys because of a critical bug

A number of recent discoveries suggest as more HTTPs websites, chat applicationss, and other services online are actualizing perfect forward secrecy. As per a Red Hat (a Linux distributor) security specialist, system equipment sold by few makers neglected to appropriately execute a broadly utilized cryptographic standard, an information releasing weakness that can permit spammers to […]

Pierluigi Paganini September 08, 2015
Tough weekend for Kaspersky patching a buffer overflow vulnerability

Last week, Kaspersky Lab was informed about a buffer overflow flaw that affects its antivirus products version 2015 and 2016 and released a patch within 24 hours. Last week, Kaspersky Lab was informed about a buffer overflow flaw that affects its antivirus products version 2015 and 2016 by one of information security engineers working in […]

Pierluigi Paganini September 07, 2015
Researcher disclosed 0day flaw in FireEye and offers others for sale

The expert Kristian Erik Hermansen disclosed a zero-day flaw in the FireEye core appliance that could be exploited to gain remote root file system access. Yesterday security researcher Kristian Erik Hermansen disclosed a zero-day vulnerability in the FireEye core appliance that could be exploited to gain remote root file system access. Hermansen told to CSOonline that he […]

Pierluigi Paganini September 07, 2015
Stealing all files from Seagate wireless disks is too easy

The CERT_org issued an alert on Seagate wireless disks because they contain multiple flaws that could be exploited to download their entire content. CERT.org issued a warning related Seagate wireless disk because they include a hidden login, most exactly a Telnet services that is not documented. This security issue allows anonymous attackers to download every file on […]

Pierluigi Paganini September 07, 2015
Fiat Chrysler recalls thousands Jeep Renegade SUVs due to hacking risks

Fiat Chrysler has recalled nearly 8,000 Jeep Renegade SUVs in the US to update the software that could be exploited by attackers to hack the vehicles. No peace for Fiat Chrysler Automobiles after the disclosure of the attack against its Jeep Cherokee model made by the popular hackers Charlie Miller and Chris Valasek. The duo of […]

Pierluigi Paganini September 06, 2015
Fiat Chrysler distributes the fix for flawed Jeep via mailed USB

The decision of Fiat Chrysler for providing a software update via Mailed USB is considered disconcerting for the security industry. Do you remember the hack of the Fiat Chrysler Jeep? In response to the disclosure of the details of the successful attack, the company recalled nearly 1.4 vehicles in the US in order to update the firmware running […]

Pierluigi Paganini September 05, 2015
Fake recruiters on LinkedIn spy on security experts

Security researchers have uncovered a group of fake recruiting accounts on LinkedIn used for intelligence gathering about security experts. A group of fake recruiter accounts is abusing the LinkedIn professional social network to send invitations to security professionals in various industries. The fake recruiters attempt to deceive targets usually by using a LinkedIn profile with […]

Pierluigi Paganini September 04, 2015
Some Uber ride data is publicly accessible through Google

Some Uber trip information is publicly accessible through simple Google queries, the set includes trip and user info, and home and work addresses. Rapid diffusion of technology makes easy phenomena of accidental data leakage, the last one is related to the popular car service Uber. Dozens of trips of Uber customers have been cached by […]