Sicurezza delle Infrastrutture IT
  • October 16, 2013

    Hackers Target Mandiant CEO Via Limo Service

    Hackers Target Mandiant CEO Via Limo Service: Hackers are apparently stalking Kevin Mandia, chief executive of the cybersecurity company Mandiant. The head of the company that famously highlighted Chinese cyber-espionage efforts earlier in the year may be feeling the effect of retaliation, as evidenced by a targeted attack he uncovered that makes use of his […]

  • October 15, 2013

    Stealthy technique fingerprints smartphones by measuring users’ movements

    Stealthy technique fingerprints smartphones by measuring users’ movements: Computer scientists have devised a technique that could one day allow advertisers or law enforcement organizations to surreptitiously fingerprint smartphones. The attack, recently unveiled by a team of researchers from Stanford University, could be attractive because it works against virtually any smartphone equipped with an “accelerometer.” That’s […]

  • October 14, 2013

    Unauthorized Access Backdoor found in D-Link

    Unauthorized Access Backdoor found in D: A number of D-Link routers reportedly have an issue that makes them susceptible to unauthorized backdoor access. The researcher Craig, specialized on the embedded device hacking – demonstrated the presence of a backdoor within some DLink routers that allows an attacker to access the administration web interface of network […]

  • October 14, 2013

    Facebook phishing attack preys on users desiring to know profile viewers

    Facebook phishing attack preys on users desiring to know profile viewers: Want to know who is visiting your Facebook page? You can’t – and even though that point is reinforced on the social media giant’s help page, it has not stopped some clever phishers from trying to trick people into thinking there is a new […]

  • October 14, 2013

    Your city is spying on you: From iPhones to cameras, you are being watched right now

    Your city is spying on you: From iPhones to cameras, you are being watched right now: We’d like to think of smart technology as a benevolent omniscience, always acting in our interests. That’s certainly the pitch by technology giants, governments, and start-ups alike. But the proliferation of surveillance mechanisms isn’t an accident. Governments, who ought […]

  • October 14, 2013

    Adobes source code was parked on hackers unprotected server

    Adobes source code was parked on hackers unprotected server: Hackers capitalize on other people’s mistakes. But they make their own as well.Case in point: A massive breach of Adobe Systems’ network was discovered after the source code of numerous products, including the Web application development platform ColdFusion, sat parked on a hacker’s unprotected Web server […]

  • October 11, 2013

    MCSO arrests 2 suspects in credit card scheme; thousands at risk

    MCSO arrests 2 suspects in credit card scheme; thousands at risk: Two people are accused of fraudulently using the credit card information of patients of Scottsdale Dermatology and its offices around the Valley. Winfred Aurelious Dick Jr., 25, and Brittney Davidson, 24, both of Phoenix, were arrested and booked into the Fourth Avenue Jail on […]

  • October 10, 2013

    Self-XSS attack explained

    Self-XSS attack explained: I’ve seen a lot of people talking about recent social-engineering attacks on Facebook, but no one has really outlined the mechanics behind them. So hopefully this video provides some light on the issue – I work on the team at Facebook that combats these attacks. This video covers both share-baiting (a pure […]

  • October 9, 2013

    Android app “bit web server” remotely vulnerable

    Steve Austin: Android app “bit web server” from ice cold apps suffers from an insecure default configuration which allows for at least injection of php web shell. Devices that are rooted will allow for said shell to be uid 0, or root. The issue was reported to the developer yesterday immediately post discovery. It is […]

  • October 3, 2013

    5 reasons not to root Android

    5 reasons not to root Android: Android is well known for its seemingly never-ending customization options and its permissive rooting credentials (well, among other things). Distributions that cannot be modified to enable elevated permissions are quite rare, as enthusiasts seek to have virtually every possible feature available at their disposal. But should you pursue that […]

Categories

  • Hacks and Incidents
  • Security News
  • Security Techniques
  • Uncategorized

Copyright © 2025 by ISGroup SRL - All Rights Reserved