Security

Pierluigi Paganini December 09, 2014
Take care of Recovery Key for Apple Two-step verification system to avoid permanently lock Apple account

If you lose your recovery key with two-step verification Apple can’t help you.By forgetting Recovery Key could completely lock a person out of their account More that one year ago Apple has introduced the two-step verification system to implement a two-factor authentication process and improve security for Apple IDs. Since March 2013 Apple has progressively extended […]

Pierluigi Paganini December 09, 2014
Google App Engine affected by more than 30 vulnerabilities

Security researchers at Security Explorations have found more than 30 vulnerabilities in the Google App Engine that allow code execution and sandbox escapes A team of security researchers in Poland announced to have discovered a number of critical vulnerabilities in the Java environment of the Google App Engine (GAE) that could be exploited by hackers […]

Pierluigi Paganini December 08, 2014
93 percent of Government Chinese websites are vulnerable

A report issued by the China Software Testing Center revealed that 93 percent of Chinese websites are vulnerable to cyber attacks. Nearly 93 percent of 1,000 Chinese government websites under evaluation is affected by vulnerabilities and other security issues. The data is part of a study conducted by the China Software Testing Center under the Chinese […]

Pierluigi Paganini December 07, 2014
The System-Aware Secure Sentinel against drone hacking

The System-Aware Secure Sentinel system is the solution able to prevent cyber attacks against drones by detecting “illogical behaviors” of the vehicle. The US Defense has sponsored the development of the System-Aware Secure Sentinel, a system to shield unmanned aerial vehicles from cyber-attacks. The system developed with funds from the US Department of Defense, the […]

Pierluigi Paganini December 06, 2014
SpoofedMe attacks exploit popular websites social login flaws

The experts at IBM have found several problems in implementation of the social login authentication of several identity providers. The researchers at IBM’s X Force security discovered a way to gain access to Web accounts by exploiting misconfiguration in some social login services. Social login, also known as social single sign-in, is a form of single […]

Pierluigi Paganini December 04, 2014
New Google API simplifies the reCAPTCHA experience

Google has simplified the authentication process by introducing an updated CAPTCHA that simply asks users whether they are a bot. Google’s new API simplifies the reCAPTCHA experience, product manager Vinay Shet said. Google has provided a significant update to its reCAPTCHA authentication system with the intent to simplify the process. The CAPTCHA is a type of […]

Pierluigi Paganini December 03, 2014
Security expert Billy Rios created WhiteScope, the database of whitelisted ICS and SCADA files

Security researcher Billy Rios has created WhiteScope, a database containing hundreds of thousands of “known-good” files of SCADA and ICS software. The cyber security expert Billy Rios has created WhiteScope, a database containing hundreds of thousands of “known-good” files from makers of SCADA and ICS software with the intent to support users to identify legitimate ICS/SCADA files. “WhiteScope has over […]

Pierluigi Paganini December 02, 2014
FBI warns of major malware-based attacks following the Sony Pictures hack

The Reuters has reported that the FBI issued a confidential warning to US businesses following the destructive malware based attack on Sony Pictures. Following the major breach breach at Sony Pictures Entertainment, the FBI  issued an alert to U.S. businesses related to possible malware-based attacks. According the Reuters Agency, the malicious code described in the alert  could be the attack […]

Pierluigi Paganini December 02, 2014
ENISA issued the Evaluation Framework on National Cyber Security Strategies (NCSS)

ENISA has presented at the workshop on National Cyber Security Strategies in Brussels the Evaluation Framework on National Cyber Security Strategies (NCSS). ENISA issued the Evaluation Framework on National Cyber Security Strategies (NCSS), an important work that addressed to policy experts and government officials that are in charge for the implementation and evaluation of an NCSS policy. The work […]

Pierluigi Paganini November 30, 2014
Acrobat Reader Windows sandbox is affected by critical flaw

A researcher at Google discovered a critical flaw in Windows Acrobat Reader 11 Sandbox that could be exploited to access a system and gain higher privileges Google security researcher James Forshaw claims that the Acrobat Reader Windows sandbox is affected by critical vulnerability that could allow attackers to compromise a system and gain higher privileges. “The […]