Sicurezza delle Infrastrutture IT
  • December 3, 2013

    Scientist-developed malware covertly jumps air gaps using inaudible sound

    Scientist-developed malware covertly jumps air gaps using inaudible sound: Computer scientists have developed malware that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when infected machines have no network connection. The proof-of-concept software—or malicious trojans that adopt the same high-frequency communication methods—could […]

  • December 3, 2013

    Malware on hospital computer impacts thousands of Seattle patients

    Malware on hospital computer impacts thousands of Seattle patients: A UW Medicine employee opened an email attachment and unknowingly downloaded malware, which led to the compromise of about 90,000 patients of Seattle-based Harborview Medical Center and University of Washington Medical Center. How many victims? About 90,000. What type of personal information? Names, addresses, phone numbers, […]

  • December 3, 2013

    Targeted Attacks Spotted Exploiting Microsoft XP Zero

    Targeted Attacks Spotted Exploiting Microsoft XP Zero: Researchers late last week discovered targeted attacks in the wild exploiting a previously unknown kernel vulnerability in Microsoft XP in what security experts say may be a sign of things to come as attackers home in on the older operating system, which Microsoft will no longer support as […]

  • December 3, 2013

    Potentially Unwanted Programs secretly serve Bitcoin miner

    Potentially Unwanted Programs secretly serve Bitcoin miner: The value of the Bitcoin for a few days has passed the psychological threshold of one thousand dollars, confirming its growth trend, the attention in the virtual currency scheme is at the highest levels and cybercriminals are exploiting new ways to monetize the unprecedented surge. Blackmarket is proposing […]

  • December 3, 2013

    Information security must become an ‘enabler’ rather than a barrier

    Information security must become an ‘enabler’ rather than a barrier: The latest information security survey published by the Department for Business, Innovation and Skills makes for frightening reading. It reveals that 93% of large organisations had a security breach last year, with the “joke” being made by many that the other 7% don’t yet know […]

  • December 3, 2013

    UW Medicine alerts 90,000 patients on stolen data

    UW Medicine alerts 90,000 patients on stolen data: UW Medicine has started notifying about 90,000 of its patients that medical information was stolen during a malware attack last month, including 15,000 cases in which Social Security numbers may have been taken. The attack happened when a UW Medicine employee opened an email attachment that contained […]

  • December 3, 2013

    NSA Spying Risks $35 Billion in U.S. Technology Sales

    NSA Spying Risks $35 Billion in U.S. Technology Sales: Disclosures of spying abroad may cost U.S. companies as much as $35 billion in lost revenue through 2016 because of doubts about the security of information on their systems, according to the Information Technology & Innovation Foundation, a policy research group in Washington whose board includes […]

  • December 3, 2013

    LinkedIn – How to exploit social media for targeted attacks

    LinkedIn – How to exploit social media for targeted attacks: The professional social network LinkedIn is a mine of information for any king of attackers, a Websense post described a typical attack scenario. Recently I read an interesting post published on the Websense security labs blog on the use of social network LinkedIn for the […]

  • December 2, 2013

    White hat Wi-Fi hacking shows vulnerability of business data

    White hat Wi-Fi hacking shows vulnerability of business data: White hat hackers have shown that usernames, passwords, contact lists, details of e-commerce accounts and banking details can be sniffed easily from public Wi-Fi hotspots.To illustrate one of the many ways people can have their data compromised, the white hat hackers from First Base Technologies conducted […]

  • November 29, 2013

    Extracting Evidence from Destroyed Skype Logs and Cleared SQLite Databases

    Extracting Evidence from Destroyed Skype Logs and Cleared SQLite Databases: It is difficult to underestimate popularity of Skype. Hundreds of millions of people use Skype every day, generating a lot of potential evidence. Recent versions of Skype are using SQLite databases to keep all history items. Chat logs, information about voice calls made and received, […]

Categories

  • Hacks and Incidents
  • Security News
  • Security Techniques
  • Uncategorized

Copyright © 2025 by ISGroup SRL - All Rights Reserved