security

Pierluigi Paganini December 25, 2015
Spying using Smartwatches and other wearable devices

Wristband and armband devices such as smartwatches and fitness trackers could be used by attackers to spy on you! We have discussed several times about the possibility to exploit IoT devices to spy on individuals. Lack of security by design and poor security settings could open the door to hackers. A Smartwatch or a fitness tracker […]

Pierluigi Paganini December 21, 2015
iOS Mobile Banking Apps, what is changed from 2013 tests?

The security expert Ariel Sanchez presented the results of the test conducted on 40 iOS banking apps, comparing them to the ones obtained 2 years ago. The banking industry is looking with an increasing interest in mobile platform, financial institutes are offering a growing number of services accessible through mobile devices, but what about security? The security […]

Pierluigi Paganini December 07, 2015
Critical vulnerabilities found in Honeywell Midas Gas Detectors

Another vulnerable IoT device is in the headlines, this time two serious vulnerabilities affect the Honeywell Midas gas detectors. Honeywell has just released firmware updates for its Midas gas detectors to fix two high severity vulnerabilities. The Midas gas detectors are a category of product manufactured by Honeywell to detect toxic, ambient and flammable gasses in the […]

Pierluigi Paganini December 07, 2015
3 OEMs Vulnerable To 3 Vulnerabilities. Your PCs At Risk

Bad news for PC users, Lenovo machines can be hijacked by visiting a malicious website, meanwhile Dell and Toshiba PC are affected by serious flaws. Security Researcher slipstream/RoL posted Proof-of-concept exploits online (3 OEMs Vulnerable To Three Vulnerability Your PCs At Risk) demonstrating how to compromise machines available on the market. Three OEMs. Three applications preinstalled. Three exploits. […]

Pierluigi Paganini November 28, 2015
Assassins in the darkweb, “Service catalogue” and Price list” updated

Contract killers on darkweb have come up with updated “service-catalogue” with updated prices. Which are major changes and trends for prices? Contract killers on darkweb have come up with updated “service-catalogue” with updated prices. While comparing the recent screenshot of their “service-catalogue” captured from a C’thulhu Darksite with the published earlier, the following updates have […]

Pierluigi Paganini November 26, 2015
IoT devices are re-using cryptographic keys, leaving in danger millions of devices

Researchers from SEC consult analyzed more than 4000 firmware’s embedded devices, where is included devices belonging to 70 vendors. The findings are astonishing! Researchers from SEC consult analyzed more than 4000 firmware’s embedded devices, where is included devices belonging to 70 vendors. The categories of devices analyzed include Internet gateways, routers, modems, IP cameras, VoIP […]

Pierluigi Paganini November 23, 2015
TrueCrypt is safer than previous examinations suggest

A new security audit the TrueCrypt software confirmed that even if it is plagued by some vulnerabilities, the application is effective when it comes to protecting data. TrueCrypt, secure or insecure … that is the question. A group of Ten auditors from the Fraunhofer Institute for Secure Information Technology has conducted a six-month audit of TrueCrypt […]

Pierluigi Paganini November 09, 2015
Is it possible to use coffee machines and stay safe from hackers?

Kaspersky Lab issued a report that warns users of the possible risks when facing with connected coffee machines and other wireless-enabled home devices. The paradigm of the Internet of Things has dramatically enlarged our surface of attack, smart devices surrounding us are a privileged target for cyber criminals. What about your coffee machine? The coffee machines could become […]

Pierluigi Paganini November 09, 2015
Cyber domain black swans

What are black swans? In defence, a black swan is a way someone has passed all your defences, although you thought you covered all the attacking vectors. A black swan is an incident that you didn’t participate. It’s a sign for the irrational way of human thinking. When you see only white swans, you don’t […]

Pierluigi Paganini October 21, 2015
Apple fixes serious flaws in the Productivity Apps

Updates released last week by Apple for Apple Productivity Apps fix a number of flaws that can be exploited for a number of attacks. Apple has recently released Keynote 6.6, Pages 5.6, Numbers 3.6, and iWork for iOS 2.6 to fix multiple flaws in the Productivity Apps, mainly related to input validation issues that caused problems […]