Apple

Pierluigi Paganini May 31, 2014
Symantec alerts on surge in Phishing for Apple ID

Symantec has released a security advisory on the increment of phishing activities for Apple ID login credentials. The Symantec security firm has published an interesting blog post to warn Apple Mobile users on the increment of phishing campaigns to steal Apple ID credentials. Cybercriminals are adopting new techniques to trick users into disclose their personal information […]

Pierluigi Paganini May 28, 2014
Extortion scheme based on ransom request hit Australian Apple Users

Cybercriminals have targeted a large number of Apple’s iCloud users with a sophisticated extortion scheme based on ransom request in Australia. The 2013 is considered the year of ransomware, the number of infections related to this kind of threat has reached levels never seen before. Cryptolocker is without doubts the most popular malware of this type, […]

Pierluigi Paganini May 07, 2014
Disclosed emails reveal assiduous collaboration between Google and NSA

Al Jazeera obtained the emails exchanged between Google executives and former NSA director Alexander which suggest that Google is very close to NSA. The IT Giants Apple, Google and Microsoft always denied any involvement in the surveillance program despite Edward Snowden as produced different documents attesting to the inconvenient truth. Now a new event is shocking the […]

Pierluigi Paganini May 02, 2014
Be aware, Apple iOS Data protection doesn’t protect email attachments

Security Researcher Andreas Kurtz noticed that email attachments within different iOS versions are not protected by Apple’s data protection mechanisms. Mobile platform security is becoming even more crucial due to the large number of applications daily used by billion of users, but we must be aware of security flaws that could also affect the mobile OS. […]

Pierluigi Paganini April 19, 2014
Unflod Baby Panda, the Chinese malware hit jailbroken iphone

Unflod Baby Panda is the name of a new mobile malware which is targeting jailbroken versions of Apple iPhone. The threat seems to have China origin. The number of cyber threats against mobile users is in constant increase, on the other hand bad habits like the practice of jailbreak/root the devices and the lack of […]

Pierluigi Paganini April 16, 2014
Samsung Galaxy S5 fingerprint sensor hacked

SRLabs researchers have published a video POC on YouTube to demonstrate how it is easy to bypass the fingerprint sensor on Samsung Galaxy S5. SRLabs researchers have published a video Proof of Concept on YouTube to demonstrate that they were able to bypass the fingerprint authentication mechanism implemented by Samsung Galaxy S5. The researchers demonstrated to […]

Pierluigi Paganini March 22, 2014
New variant of Zorenium Bot can infect iOS devices

Security analysts at SenceCy which are monitoring the advancement of a new Zorenium Bot discovered that it is able to infect also iOS devices. Security analysts at SenceCy are monitoring the evolution for the Zorenium Bot, a new and unknown malware which has been advertised in the underground since January 2014. This is the third […]

Pierluigi Paganini March 20, 2014
Tor browser app in the Apple app store is fake

For more than two months is is present in the official App Store a fake version of the Tor Browser app. It’s full of adware and spyware. The Tor Browser is the most popular tool for anonymization of the user’s Internet experience, it’s use is literally exploded after the  disclosure of numerous documents leaked by […]

Pierluigi Paganini March 06, 2014
Trend Micro report on Chinese Mobile Underground Market

This report provides a brief overview of some basic underground activities in the mobile space in China, describing products and services. Security firm Trend Micro issued an interesting report on Chinese cybercrime which is increasingly targeting mobile platforms thanks to a vast underground offer of services and tools. Trend Micro Mobile Cybercriminal Underground Market report analyzes […]

Pierluigi Paganini March 05, 2014
GnuTLS flaw in certificate verification exposes Linux world to attacks

A serious flaw in the certificate verification process of GnuTLS exposes Linux distros, apps to attack. Another flaw exploitable for surveillance purposes. GnuTLS is an open source secure communications library implementing the SSL, TLS and DTLS protocols, it is used in hundreds of software packages including Red Hat desktop,  all Debian and Ubuntu Linux distributions and many […]