Security

Pierluigi Paganini May 21, 2014
Outlook Android App stores emails in plain text on mobile

Researchers at Include Security discovered that the Outlook.com Android App leaves user email messages unprotected by default on the mobile SD cards. A Microsoft Outlook client app for the Android platform lacks of encryption for the storage of email messages on the device’s SD cards. The unique protection mechanism implemented for the Outlook app is a […]

Pierluigi Paganini May 21, 2014
Windows 8 banned by China for Government Computers

Chinese Authorities ban the use of Microsoft Windows 8 Operating System for Government Computers, the ban is not extended to private environment. The tension between US and China is increasing, both governments are accusing each other of cyber espionage and both are prohibiting the use of foreign products in the government environment. In the past US […]

Pierluigi Paganini May 15, 2014
How to hack PayPal Manager and manage your Payflow account

Mark Litchfield, Security expert at Securatary, has published a proof of concept on the way it is possible to hack PayPal Manager Admin Account. Mark Litchfield, security expert at Securatary has published an interesting post on PayPal Manager Admin Account Hijack, let’s remember that PayPal Manager is used to manage user’s Payflow account. The attack method against […]

Pierluigi Paganini May 13, 2014
Who and how is using forged SSL certificates worldwide?

Who is abusing of forged SSL certificates in MITM attacks worldwide? A team of researchers implemented a new detection technique to detect the abuses. A team of researchers at Carnegie Mellon University and engineers at Facebook have designed a detection technique for man-in-the-middle attacks over SSL on a large-scale. They analyzed the data extracting useful information, including the […]

Pierluigi Paganini May 12, 2014
Multiple Security Misconfiguration in Juniper Online Service’s Lead to Expose Sensitive data

Security researcher Mohammed Saeed has Identified Multiple Security Misconfiguration in Juniper Online Service’s Lead to Expose Sensitive data and much more. Security researcher Mohammed Osman Saeed has Identified Multiple Security Misconfiguration in Juniper Online Service’s Lead to Expose Sensitive data & Lead to Control four Juniper Load-Balancer been accessed From Remote. He also disclosed Multiple XSS in […]

Pierluigi Paganini May 12, 2014
Check Point Security Report 2014 – Malware in the enterprise

Check Point 2014 Security Report shows major security events occurred in 2013 show and provides useful information on current malware trends. Check Point Software Technologies published 2014 Security Report to highlight major security events occurred last year and show current malware trends. The data were collected monitoring network traffic from 996 organizations of various industries. Nearly 84 percent […]

Pierluigi Paganini May 11, 2014
AirChat project supported by Anonymous to secure communications

Entities claiming to be part of Anonymous collective are working to put together a secure communications project named Airchat based on ham-radio Fldigi modem controller. Entities claiming Anonymous affiliation are supporting the AirChat project, available for consultation on the Github, for the design of  a secure communication based on the open source ham-radio Fldigi modem controller. “We traded bandwidth for freedom, or […]

Pierluigi Paganini May 11, 2014
US DoJ proposal legalizes secret hacking for federal agencies

US DoJ formalized a proposal to allow U.S Federal Agencies to secretly hack suspects’ computers to collect criminal evidence into investigations. The US Justice Department (DOJ) wants secretly hack into the suspected criminal’s computer during investigations at any times in bunches for collection of evidence. The document titled “COMMITTEE ON RULES OF PRACTICE AND PROCEDURE” defines […]

Pierluigi Paganini May 10, 2014
Heartbleed one month later, at least 300k servers are still vulnerable

Security researcher Robert Graham published the results of recent global scan searching for Heartbleed vulnerable systems. 300k systems are still vulnerable Heartbleed flaw is a bug disclosed more than a month ago, which affected OpenSSL library with serious repercussion on most common encryption services we daily use. Encrypted communications, mobile platforms, VPN and Tor networks are just a […]

Pierluigi Paganini May 10, 2014
Federal Trade Commission – Watch out to Health and Fitness Apps

The Federal Trade Commission debated on the privacy ramifications of consumer generated and controlled health data, following data on mobile apps. The Federal Trade Commission has recently released the disconcerting results of a study conducted on 12 mobile health and fitness apps, focusing the analysis on the way they manage users’ personal information. Let me anticipate that […]