Soluzioni per l'analisi della Sicurezza Informatica
  • ISGroup Independent Research [EN]
  • ISGroup Partner per la sicurezza [IT]
  • April 1, 2014

    Researcher lights fire under Tesla security

    Researcher lights fire under Tesla security: A security researcher is calling on Tesla to introduce two-factor authentication for access to the combination of services that make its Tesla S model one of the most “Internet of Things” vehicles in the world today. As noted by Threatpost, researcher Nitesh Dhanjani has found that the combination of […]

  • April 1, 2014

    Social Engineering and Online Dating

    Social Engineering and Online Dating: I have blogged on the topic of online dating in the past, and how it’s not much different than phishing and other forms of online fraud.  While it was meant to mock my personal experiences of dating in the 21st century, identity theft is no laughing matter.  In the last […]

  • April 1, 2014

    NSA infiltrated RSA security more deeply than thought

    NSA infiltrated RSA security more deeply than thought: Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency’s ability to eavesdrop on some Internet communications, according to a team of academic researchers. Reuters reported in December that the NSA had paid […]

  • April 1, 2014

    Breaking through the firewall between Security and Privacy: Canadian Anti

    Breaking through the firewall between Security and Privacy: Canadian Anti: On July 1 2014 the new Canadian Anti-Spam legislation CASL will begin to be enforcedfirst of three phases. Why should I care if I live outside Canada, or what does it mean if I am a Canadian Business, or should I care if I am […]

  • January 24, 2014

    How to Stop Web Sites from Potentially Listening to Your Microphone

    How to Stop Web Sites from Potentially Listening to Your Microphone: Heres the lowdown. Once you give a site permission to use your microphone or camera, Chrome assumes that site will have permission to do so in the future. That means every instance of that site, every page on that site, also has access to […]

  • December 22, 2013

    The value of stolen card data that includes localization info

    The value of stolen card data that includes localization info: The hackers behind Target data breach are selling stolen card data including localization info. Why?In numerous posts I have highlighted the possibility to acquire stolen card data on the black market, different website on the underground and within the Deep Web proposed the precious commodities […]

  • December 21, 2013

    Facebook accused of mining private messages

    Facebook accused of mining private messages: Facebook is facing a class-action lawsuit in the US which alleges the company mines data from private messages without users’ knowledge or consent, and shares the information with advertisers. The lawsuit by two US users accuses Facebook of violating the Electronic Communications Privacy Act and California privacy laws by […]

  • December 20, 2013

    Snapchat To Update App In Wake Of Breach

    Snapchat To Update App In Wake Of Breach: Snapchat, a mobile photo-messaging app created for wiping out traces of the messages for privacy reasons, this week was hit with a major breach of its users privacy that exposed names and phone numbers of some 4.6 million of its customers. The data dump came after security […]

  • December 19, 2013

    Drugmakers urge FDA security audit after cyber breach

    Drugmakers urge FDA security audit after cyber breach: BOSTON (Reuters) – The U.S. Food and Drug Administration is under pressure from the pharmaceutical industry and lawmakers to undergo an independent security audit, after hackers broke into a computer system used by healthcare companies to submit information to the agency. Drug companies fear the cyber thieves […]

  • December 17, 2013

    Apple approves homosexual meetup app for users as young as 12

    Apple approves homosexual meetup app for users as young as 12: CUPERTINO, CA, December 16, 2013 (LifeSiteNews.com) – “If you’re gay and new to an area, how do you find out where gay people hang out?”  That, according to the creators of a newly-approved app for Apple’s iOS-based phones and tablets, is the “overly simplistic […]

Categories

  • Hacks and Incidents
  • Security News
  • Security Techniques
  • Uncategorized

Copyright © 2025 by ISGroup SRL - All Rights Reserved