Security

Pierluigi Paganini December 15, 2014
Stingray surveillance devices used to spy on the Norwegian Parliament

A newspaper discovers that bad actors are spying on cell phone communications of Norwegian politicians using the StingRay mobile surveillance equipment. The journalists of a daily newspaper in Norway have discovered a mobile phone surveillance equipment hidden around the Government and Parliamentary building and apparently there is no information on who has used it. Everyday we read about cyber […]

Pierluigi Paganini December 15, 2014
GCHQ launches Cryptoy mobile app to teach cryptography

Cryptoy is the free educational app about cryptography designed by GCHQ for use by secondary school students and their teachers. The British Intelligence agency GCHQ has launched “Cryptoy”, an Android mobile app that was designed to encourage youngsters to tackle emerging cyber security threats, the Agency made it available to download today. The Cryptoy mobile app was developed by […]

Pierluigi Paganini December 13, 2014
Internet of Things – Security and privacy issues presented at ISACA Roma & OWASP Italy conference

Yesterday Pierluigi Paganini presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. Yesterday I presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. The presentation highlights the security and privacy issues for the […]

Pierluigi Paganini December 13, 2014
Microsoft recalls Exchange patch in the last Tuesday Update, it is the second straight month

Microsoft recalls Exchange patch, it’s the second time in two months that Microsoft is recalling a security update published along with its patch Tuesday release. Microsoft has announced the recall of a security patch released to fix a problem in its Exchange Server. It is the second straight month that Microsoft has issued a critical […]

Pierluigi Paganini December 11, 2014
Smartwatch Hacked, how to access data exchanged with Smartphone

Security experts at BitDefender demonstrated how is possible to access data exchanged between a smartwatch and a smartphone via Bluetooth. The paradigm of Internet of Things is influencing modern society and the way it approaches the technology in everyday life. An impressive amount of Intelligent devices surround us, but often we ignore the repercussion in term of security and privacy. […]

Pierluigi Paganini December 10, 2014
Hackers leak scripts, celebrity phones and aliases at Sony Pictures Entertainment

GOP released a new archive of Sony Pictures Entertainment confidential data including private information of employees, celebrity phone numbers, film scripts and many more. The Sony Pictures data breach is becoming a never ending history, the GOP is leaking company data and much more since the attack while security firms are providing the details of their […]

Pierluigi Paganini December 10, 2014
POODLE SSL flaw is threatening also TLS Security Protocol

Researchers at Qualys revealed that POODLE is likely to hit some of the most popular websites because the flaw also affects implementations of newer TLS. POODLE (Padding Oracle On Downgraded Legacy Encryption) is a critical vulnerability affecting SSL that was discovered in October 2014. The researchers at Google that discovered it, explained that the POODLE flaw is related […]

Pierluigi Paganini December 09, 2014
Take care of Recovery Key for Apple Two-step verification system to avoid permanently lock Apple account

If you lose your recovery key with two-step verification Apple can’t help you.By forgetting Recovery Key could completely lock a person out of their account More that one year ago Apple has introduced the two-step verification system to implement a two-factor authentication process and improve security for Apple IDs. Since March 2013 Apple has progressively extended […]

Pierluigi Paganini December 09, 2014
Google App Engine affected by more than 30 vulnerabilities

Security researchers at Security Explorations have found more than 30 vulnerabilities in the Google App Engine that allow code execution and sandbox escapes A team of security researchers in Poland announced to have discovered a number of critical vulnerabilities in the Java environment of the Google App Engine (GAE) that could be exploited by hackers […]

Pierluigi Paganini December 08, 2014
93 percent of Government Chinese websites are vulnerable

A report issued by the China Software Testing Center revealed that 93 percent of Chinese websites are vulnerable to cyber attacks. Nearly 93 percent of 1,000 Chinese government websites under evaluation is affected by vulnerabilities and other security issues. The data is part of a study conducted by the China Software Testing Center under the Chinese […]