Visualizzazione dei post da 2015

Researcher criticises 'weak' crypto in Internet of Things alarm system

BBC News: AVG's Web TuneUp put millions of Chrome users at risk

Porno su maxischermo del casinò a Portorose: catturato - Cronaca - Il Piccolo

Google probes AVG Chrome widget after 9m users exposed by bugs • The Register

Critical Flaws Found in Network Management Systems

Botnet of Aethra Routers Used for Brute-Forcing WordPress Sites

Password-less database 'open-sources' 191m US voter records on the web

Patch now! Flash-exploitin' PC-hijackin' attack spotted in the wild by Huawei bods

Feds widen probe into lottery IT boss who rooted game for profit

BBC News: Hyatt hotel visitors hit by payments system hack attack

BBC News: Man pleads guilty to financial news hack

Keeping browsing experience in users’ hands | Microsoft Malware Protection Center

Nota senza titolo

Secret Code Found in Juniper's Firewalls Shows Risk of Government Backdoors | WIRED

Juniper Networks finds backdoor code in its firewalls

Microsoft Trusted Root Certificate program getting a lot less trusting • The Register

Chinese Hacker Pockets $170,000 After Hacking Airline Website

Patch madness! 273 vulnerabilities from four vendors in one week - SC Magazine UK

Press Backspace 28 times to own unlucky Grub-by Linux boxes

Project Zero: FireEye Exploitation: Project Zero’s Vulnerability of the Beast

Exploit upgrade for Microsoft Word Intruder crimeware kit |

Car parking apps vulnerable to man-in-the-middle attacks |

FireEye flamed: single email allows total network access

Patch now! Joomla attacked in remote code execution blitzkrieg

European Space Agency records leaked for amusement, attackers say

Attack Against DNS Root Servers

MacKeeper Leaks 13 Million Mac Owners' Data, Leaves Passwords Open To Easy Cracking - Forbes

Nota senza titolo

Nota senza titolo

Nota senza titolo

Russian friends make German web scum the 'best' in European Union

Apple's App Store infected with XcodeGhost malware in China - BBC News

Predictable: How AV flaw hit Microsoft's Windows defences • The Register

Car parking mobile apps are vulnerable to hacking, say infosec folk • The Register

Android Gmail bug lets you spoof your email address

The Casino Malvertising Campaign

Who's running dozens of top-secret unpatched databases? The Dept of Homeland Security

Hackers add exploit kit to article asking 'Is cyber crime out of control?'

Microsoft Security Bulletin MS15-127 - Critical

State-sponsored hackers spread backdoors in Middle East

Revealed: Mystery 7-year cyberspy campaign in Latin America

Microsoft warns of possible attacks after Xbox Live certificate leaked |

Phony WhatsApp update could cost you much more than a dollar |

Anonymous tumba la web del primer ministro nipón por la caza de ballenas

All eyes on the jailbroken as iOS, Mac OS X threat level ratchets up

'Legacy' Wordpress blog site of The Independent serving malware

Brit-American hacker duo throws pwns on IoT BBQs, grills open admin

Kaspersky, McAfee, and AVG all vulnerable to major flaw

Epic failure of Phone House & Dutch telecom providers to protect personal data: How I could access 12+ million records #phonehousegate | Weblog | Sijmen Ruwhof

Someone Just Tried to Take Down Internet's Backbone with 5 Million Queries/Sec

Microsoft Security Bulletin MS15-127 - Critical

Why Algebraic Eraser may be the riskiest cryptosystem you’ve never heard of

Ad Fraud Botnet Might Cause $3 Billion in Damages to Online Advertisers

Nota senza titolo

Windows' Nemesis: Pre-boot malware pwns payment processors • The Register

Day 2: UK research network Janet still being slapped by DDoS attack

A search engine for the Internet of (insecure) Things |

Microsoft leaks Xboxlive SSL server cert

Kill Flash Now: 78 bugs patched in latest update

It's nearly 2016, and Windows DNS servers can be pwned remotely

Linksys routers vulnerable through CGI scripts • The Register

Yahoo Mail fixed against evil emails you didn’t need to open |

Nota senza titolo

Forced authorisation chip and PIN scam hitting high-end retailers | Bentham's Gaze

Windows' Nemesis: Pre-boot malware pwns payment processors • The Register

Industrial gas detectors vulnerable to a remote attacker |

Whisper this, but Java deserialisation vulnerability affects more libraries • The Register

Russian "Pawn Storm" expands, rains hell on NATO, air-gapped PCs

Lock up your top-of-racks, says Cisco, there's a bug in the USB code

OopSSL: Pushme-Pullyou for OpenSSL patches

High-Profile Mobile Apps At Risk Due to Three-Year-Old Vulnerability

Domination: Crims steal admin logins, infect sites, drop Cryptowall 4

Dorkbot - botnet

Anatomy of a Wi-Fi hole: Take care in your hotel this Christmas! |

Ponmocup is the '15 million' machine botnet you've never heard of • The Register

Industrial control system gateway fix opens Heartbleed, Shellshock • The Register

Popular 3G/4G data dongles are desperately vulnerable, say hackers • The Register

Australia Bureau of Meteorology 'hacked' - BBC News

VTech Hacker Explains Why He Hacked the Toy Company | Motherboard

Insecure App Exposed Billboard Lights to Hacker Attacks | SecurityWeek.Com

DHS Giving Firms Free Penetration Tests — Krebs on Security

Conficker, back from the undead, dominates malware threat landscape

Hacker holds UAE bank to ransom, demands $3m

Can't get a break: Pwned Linux ransomware pwned again, infects 3000

Belkin's N150 router is perfect for learning hacking skills – wait, what, it's in production?

Cisco's telco-grade uber-routers can make almost anyone root

Millions of Internet Things are “secured” by the same “private” keys |

How Corporate America keeps huge hacks secret November 30

VPN users menaced by port forwarding blunder • The Register

Port Fail: Vulnerability reveals real IP | Perfect Privacy

Cops arrest 2 for operating “Fully UnDetectable” malware service |

Just in time for Xmas: Extra stealthy Point of Sale malware • The Register

Nota senza titolo

Nota senza titolo

Mr Grey, the Russian hacker who helped haul in 1.2 billion logins • The Register

Researcher reveals Chinese e-crime shopping list • The Register

Dell apologizes for HTTPS certificate fiasco, provides removal tool | Ars Technica

Lazy IoT, router makers reuse skeleton keys over and over in thousands of devices – new study • The Register

Hacker predicts AMEX card numbers, bypasses chip and PIN • The Register

Nota senza titolo

Nota senza titolo

Nota senza titolo

Pen tester sounds alert over 'gaping' flaws in Brit alarm platform

Superfish 2.0 worsens: Dell's dodgy security certificate is an unkillable zombie

British duo arrested for running malware encryption service

World's most complex cash register malware plunders millions in US

Dell does a Superfish, ships PCs with easily cloneable root certificates | Ars Technica

Superfish 2.0: Dell ships laptops, PCs with gaping internet security hole • The Register

United Airlines Bug Bounty: An experience in reporting a serious vulnerability - Randy Westergren

Criminal Ruskie BOFHs help hackers steal $790 million in three years • The Register

Android adware can install itself even when users explicitly reject it | Ars Technica

Criminal are mostly hacking-by-numbers with exploit kits • The Register

Hacking group Strontium dogs NATO and government targets • The Register

Vicious Chrome V8 JavaScript Exploit Leaves All Android Devices Ripe For Attack | HotHardware

Botnet that enslaved 770,000 PCs worldwide comes crashing down

Badware in the firmware all over the place

Target stores attacked by pornographic pranksters - BBC News

Ransomware-as-a-service surfaces, wants 10 percent profit cut

FastMail falls over as web service extortionists widen attacks and up their prices • The Register

Naked Security

Latest Android phones hijacked with tidy one-stop-Chrome-pop • The Register

Booming crypto ransomware industry employs new tricks to befuddle victims | Ars Technica

XOR DDoS Botnet Launching 20 Attacks a Day From Compromised Linux Machines | Akamai

Severe SAP HANA vulnerabilities allow hackers to take full control | ZDNet

Packet floods can bork Borg's security kit

Comodo kills 'forbidden' certs

Severe SAP HANA vulnerabilities allow hackers to take full control | ZDNet

The Economist spreading malware

Epic Fail: Power Worm Ransomware Accidentally Destroys Victim's Data During Encryption - Softpedia

What Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application Have in Common? This Vulnerability. |

Naked Security

ProtonMail: encrypted email provider held ransom by hackers | Technology | The Guardian