Sicurezza delle Infrastrutture IT
  • January 13, 2014

    Sorry, Google+, We Still Won’t Come to Your Party

    Sorry, Google+, We Still Won’t Come to Your Party: By now, it’s a depressingly familiar business tactic from Google. The search giant changes a feature somewhere in its arsenal of services to make that service integrate more tightly, and annoyingly, with the social network Google+. Sign-ups are required. Engagement is mandated. Then Larry Page gets […]

  • January 13, 2014

    Coinye fights back against Kanye West with its own cease and desist letter

    Coinye fights back against Kanye West with its own cease and desist letter: Just four days after Kanye West’s attorney sent a cease and desist letter to the anonymous group behind Coinye, the cryptocurrency’s developers have turned around and responded with a cease and desist letter of their own. In a letter sent Friday to […]

  • January 13, 2014

    Microsoft Twitter accounts hacked by SEA

    Microsoft Twitter accounts hacked by SEA: Microsofts official Xbox support Twitter and the official Microsoft news Twitter accounts have been hacked today by the Syrian Electronic Army, marking the most recent in a long line of attacks against social media accounts by the organization. The SEA, a collection of computer hackers in support of the […]

  • January 11, 2014

    Snapchat blurts out the S-word

    Snapchat blurts out the S-word: Team Snapchat, as it calls itself, has finally used the S-word. Over Christmas 2013, the selfie-sharing site was confronted with warnings that its “find a friend by phone number” service was open to abuse. Snapchat wrote off the risk as “theoretical.” We’ll assume that Snapchat didn’t mean to throw down […]

  • January 11, 2014

    LinkedIn company filed a complaint in San Francisco against unknown hackers responsible for the creation of an impressive amount of fake profiles

    LinkedIn: LinkedIn is considered the social network of professionals, its scope is to give the possibility to the users to build their network of business relationship, sharing content of interest and exchanging opinion and suggestion in dedicated discussions. But LinkedIn represents for hackers and cyber spies an amazing source of information that could be gathered […]

  • January 11, 2014

    Yahoo Mail turns on HTTPS encryption by default to protect users

    Yahoo Mail turns on HTTPS encryption by default to protect users: After the release of NSA Secret spying over Internet communications, I am expecting from all tech companies to make surveillance significantly harder. Yahoo has HTTPS encryption support since late 2012, but users had to opt in to use the feature. Documents revealed by the […]

  • January 11, 2014

    Threat Intelligence – New Locker: Prison Locker (aka: Power Locker ..or whatever those bad actor call it)

    Threat Intelligence – New Locker: Prison Locker (aka: Power Locker ..or whatever those bad actor call it): Malware bad actors just keep on coding and developing new threats with the stupid dream to get rich soon in their stupid heads. It’s a serious moral corruption generated by whatever background they are raised, but that’s a […]

  • January 11, 2014

    Data scrapers used Amazon cloud to reap biz bods’ CVs, wails LinkedIn

    Data scrapers used Amazon cloud to reap biz bods’ CVs, wails LinkedIn: LinkedIn is still waging its battle against “scrapers”, who use software to automatically harvest publicly available personal information from the social network. And that fight has today wound up in a California court where the website’s bosses are trying to unmask the miscreants […]

  • January 11, 2014

    Malware Attacks Deployed by “Advanced Power” Botnet

    Malware Attacks Deployed by “Advanced Power” Botnet: As reported by KrebsOnSecurity, more than 12,500 systems have been tangled up in a botnet that uses victims to deploy malware attacks through a bogus and now-blocked Firefox extension going by the name “Microsoft .NET Framework Assistant”. Dubbed “Advanced Power”, the botnet looks for vulnerable server configurations on […]

  • January 10, 2014

    Zeus Infection Spoofing Bitdefender AV Webroot Threat Blog

    Zeus Infection Spoofing Bitdefender AV Webroot Threat Blog: Over the Christmas period, we here at Webroot  have noticed a large amount of Zeus infections that are spoofing the Bitdefender name. While infections spoofing AV companies aren’t unusual, it’s been a while since we have seen such a spike on one particular vendor in such a […]

Copyright © 2025 by ISGroup SRL - All Rights Reserved -