Sicurezza delle Infrastrutture IT
  • September 24, 2013

    US bank regulator raises prospect of cyber

    US bank regulator raises prospect of cyber: A top US banking regulator has warned that more legislation may be needed in the fight against an ever-growing cyber-security threat. Earlier this year President Barack Obama signed a cyber-security executive order designed to improve collaboration and information sharing between the government and critical infrastructure providers such as […]

  • September 21, 2013

    Google knows nearly every Wi

    Google knows nearly every Wi: If an Android device phone or tablet has ever logged on to a particular Wi-Fi network, then Google probably knows the Wi-Fi password. Considering how many Android devices there are, it is likely that Google can access most Wi-Fi passwords worldwide. Recently IDC reported that 187 million Android phones were shipped […]

  • September 20, 2013

    Stop using NSA

    Stop using NSA: Officials from RSA Security are advising customers of the company’s BSAFE toolkit and Data Protection Manager to stop using a crucial cryptography component in the products that was recently revealed to contain a backdoor engineered by the National Security Agency. An advisory sent to select RSA customers on Thursday confirms that both […]

  • September 20, 2013

    Cyber Threats Pose Potential Systemic Risk

    Cyber Threats Pose Potential Systemic Risk: Hackers and other cybercriminals pose as grave a threat to the financial system as the recent financial crisis if banks and government officials don’t mount an effective response, a top U.S. official warned Wednesday. The growing sophistication of cyberattacks spawned by criminal organizations, hackers and other foreign governments could […]

  • September 20, 2013

    Hacking Satellites … Look Up to the Sky

    Hacking Satellites … Look Up to the Sky: Satellites have assumed a crucial role in our contemporary society; they are used in both private and public sectors for numerous purposes, from communication to research. Unfortunately, with the diffusion of this complex system, the interest of governments and hackers also increased; their security is today a […]

  • September 20, 2013

    A look to Android offer in the underground mobile market

    A look to Android offer in the underground mobile market: In the last months security firms have observed an increase in criminal activities that exploited Android OS supported by the proactive evolution of the offerings in the underground mobile market. Dancho Danchev is considered one of most accredited experts of the criminal underground and its evolution, he described numerous initiatives for monetization of […]

  • September 20, 2013

    A Few Thoughts on Cryptographic Engineering: The Many Flaws of Dual_EC_DRBG

    A Few Thoughts on Cryptographic Engineering: The Many Flaws of Dual_EC_DRBG: As a technical follow up to my previous post about the NSA’s war on crypto, I wanted to make a few specific points about standards. In particular I wanted to address the allegation that NSA inserted a backdoor into the Dual-EC pseudorandom number generator. […]

  • September 16, 2013

    India engineers arrested for selling source codes

    India engineers arrested for selling source codes: Two software engineers from Bangalore, India, have been arrested for allegedly stealing software source codes from a local company and selling the codes to another local-based company. Hyderabad-based technology vendor, MIC Technologies, lodged a report with cybercrime police claiming its patented software and technology information had been stolen […]

  • September 16, 2013

    Saboteurs target OAuth protocol to compromise HootSuite users

    Saboteurs target OAuth protocol to compromise HootSuite users: A number of compromised HootSuite accounts were to blame for a recent influx of Twitter spam peddling dieting products. After obtaining users’ account details elsewhere, spammers were able to fraudulently sign into HootSuite – a popular dashboard tool that helps users manage their social networking profiles on […]

  • September 15, 2013

    Meet Hacking Team, the company that helps the police hack you

    Meet Hacking Team, the company that helps the police hack you: In 2001, a pair of Italian programmers wrote a program called Ettercap, a “comprehensive suite for man-in-the-middle attacks” — in other words, a set of tools for eavesdropping, sniffing passwords, and remotely manipulating someone’s computer. Ettercap was free, open source, and quickly became the weapon […]

Categories

  • Hacks and Incidents
  • Security News
  • Security Techniques
  • Uncategorized

Copyright © 2025 by ISGroup SRL - All Rights Reserved