Sicurezza delle Infrastrutture IT
  • October 3, 2013

    Underground Drugs Market website ‘Silk Road’ Founder Arrested by FBI

    Underground Drugs Market website ‘Silk Road’ Founder Arrested by FBI: The FBI had seized a website called ‘Silk Road’, that was considered one of the most popular Underground places on the Internet for buying drugs and other illicit goods and services. They arrested the site’s alleged founder, Ross William Ulbricht, known as “Dread Pirate Roberts,” in San Francisco, […]

  • October 3, 2013

    UK to hire hundreds of hackers for new £500m cyber

    UK to hire hundreds of hackers for new £500m cyber: Britain is building an army to wage war by hurling computer hackers at its enemies. Defence Secretary Philip Hammond said the country is recruiting “hundreds” of hackers at a cost of up to £500 million ($909 million), The Register reported. News of the “laptop army” was […]

  • October 3, 2013

    7 sneak attacks used by todays most devious hackers

    7 sneak attacks used by todays most devious hackers: Millions of pieces of malware and thousands of malicious hacker gangs roam todays online world preying on easy dupes. Reusing the same tactics that have worked for years, if not decades, they do nothing new or interesting in exploiting our laziness, lapses in judgment, or plain […]

  • October 1, 2013

    Silent Circle Moving Away From NIST Ciphers in Wake of NSA Revelations

    Silent Circle Moving Away From NIST Ciphers in Wake of NSA Revelations: The first major domino to fall in the crypto world after the NSA leaks by Edward Snowden began was the decision by Lavabit, a secure email provider, to shut down in August rather than comply with a government order. Shortly thereafter, Silent Circle, […]

  • October 1, 2013

    The Many Flaws of Dual_EC_DRBG

    The Many Flaws of Dual_EC_DRBG: As a technical follow up to my previous post about the NSA’s war on crypto, I wanted to make a few specific points about standards. In particular I wanted to address the allegation that NSA inserted a backdoor into the Dual-EC pseudorandom number generator. For those not following the story, […]

  • October 1, 2013

    Metasploit creator seeks crowds help for vuln scanning

    Metasploit creator seeks crowds help for vuln scanning: Security outfit Rapid7 has decided that theres just too much security vulnerability information out there for any one group to handle, so its solution is to try and crowd-source the effort. Announcing Project Sonar, the company is offering tools and datasets for download, with the idea that […]

  • September 27, 2013

    Senators Introduce Bill to Limit NSA’s Spying Powers

    Senators Introduce Bill to Limit NSA’s Spying Powers: A bipartisan coalition of senators introduced a new bill to limit the NSA’s powers to collect data on Americans on Wednesday. The bill is the most comprehensive legislative package unveiled to date and would ban the NSA from collecting Americans’ phone and email records. The bill, called […]

  • September 27, 2013

    Google Talk users complain of messages being sent to wrong recipients (update)

    Google Talk users complain of messages being sent to wrong recipients (update): Google appears to be experiencing some major issues with its chat service today. A large number of users have complained on Twitter and at Google’s product forums that messages are being delivered to the wrong recipients on Google Talk. The problems appear to […]

  • September 25, 2013

    WebView addJavascriptInterface Remote Code Execution

    WebView addJavascriptInterface Remote Code Execution: Many free mobile applications use a WebView to load HTML content as an in process web browser to facilitate advertisement loading from remote advertiser networks. These advertisements are loaded over a clear text channel (HTTP) and are susceptible to Man in the Middle (MitM) attacks. An attacker able to MitM […]

  • September 24, 2013

    Debug/test feature in init allows any user to execute shell commands as the root user on some Motorola and Sharp devices.

    Justin Case: Debug/test feature in init allows any user to execute shell commands as the root user on some Motorola and Sharp devices. Lets see if we can bump my embarrassing presentation further down the page… This vulnerability is being published now as the responsible parties have informed me that it will not be fixed […]

Categories

  • Hacks and Incidents
  • Security News
  • Security Techniques
  • Uncategorized

Copyright © 2025 by ISGroup SRL - All Rights Reserved