The Reddit social news website issued its first transparency report shows it complied with only 32 user info requests in 2014. Reddit, the popular social news website has released its first Reddit transparency report that details data related the requests for user information and requests for content removal the company received in 2014. It is not […]
The 17-year-old security researcher Indrajeet Bhuyan discovered two security flaws in the newborn WhatsApp Web client which menace user privacy. Just a week after the presentation of WhatsApp Web, the desktop version of the popular mobile messaging application WhatsApp, a 17-year-old security researcher Indrajeet Bhuyan discovered two security flaws. Bhuyan is already known to the IT security community because […]
The entrepreneur Kim Dotcom has launched MegaChat, a new feature on Mega.nz that allows end-to-end encrypted audio and video communications. The Internet community is even more scared by continuous violation of the privacy for this reason IT community is looking new solutions that could protect users’ experience online from prying eyes. Government could be snooping in our […]
Apple has patched the iCloud flaw exploited by iDict tool, the news was confirmed by the author of the hacking application via Twitter. Last week the iDict hacking tool has been released by a hacker known as Pr0x13, the expert posted the code of iDict on GitHub explaining that it is very easy to use and exploits a […]
iDict is the a hacking tool that was published on GitHub and that can break into any iCloud account running an Apple ID Dictionary attack. A hacker has released a tool called iDict that he sustains that could be used to break into any iCloud account. According to the expert, iDict implements an exploit that is able […]
A newspaper discovers that bad actors are spying on cell phone communications of Norwegian politicians using the StingRay mobile surveillance equipment. The journalists of a daily newspaper in Norway have discovered a mobile phone surveillance equipment hidden around the Government and Parliamentary building and apparently there is no information on who has used it. Everyday we read about cyber […]
Yesterday Pierluigi Paganini presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. Yesterday I presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. The presentation highlights the security and privacy issues for the […]
Twitter announced app graph, it will now track every mobile app its users have Installed on their smartphones and tables. Privacy advocates arise. Twitter announced the implementation of the “app graph” function that will allow the company to provide “more personal Twitter experience” by serving targeted advertisements by serving targeted advertisements. This means that also Twitter, like […]
Verizon Wireless injects UIDH headers to every user’s Web request to track its web experience including visited websites and his habits. Verizon Wireless, the greatest US Telecom operator is tracking the internet traffic of its mobile users by adding a token to Web requests. The token is used by the company for advertising purpose, Verizon tracks the user’s habits, even if he had opted out […]
The Snappening, hundreds of thousands of unaware users have had their personal Snapchat photos and videos public disclosed by hackers. The Fappening is considered my mass media one of most interesting case of privacy violation, four archives containing a numerous celebrities nude photos have been released in the last weeks … and many experts sustain that the […]