Soluzioni per l'analisi della Sicurezza Informatica
  • ISGroup Independent Research [EN]
  • ISGroup Partner per la sicurezza [IT]
  • September 9, 2013

    Spy Service Exposes Nigerian ‘Yahoo Boys’

    Spy Service Exposes Nigerian ‘Yahoo Boys’: A crude but effective online service that lets users deploy keystroke logging malware and then view the stolen data remotely was hacked recently. The information leaked from that service has revealed a network of several thousand Nigerian email scammers and offers a fascinating glimpse into an entire underground economy […]

  • September 9, 2013

    Bitcoin ATMs coming to Canada this fall

    Bitcoin ATMs coming to Canada this fall: The first time Ryan Johnson bought Bitcoins — an emerging digital currency that isn’t controlled by any authority such as a central bank — was with a pocket full of cash from a stranger he had met online. “It was almost like a sketchy drug deal,” recalls the […]

  • September 8, 2013

    Facebook to Pay Users $20 Million for Sharing Personal Data in Ads

    Facebook to Pay Users $20 Million for Sharing Personal Data in Ads: The ads, which were posted on both the right-hand side of the site and in news feeds, used member names, pictures and details about the brands and interests they Like on the site. Members whose details appeared in the ads will now receive […]

  • September 8, 2013

    Majority of Tor crypto keys could be broken by NSA, researcher says

    Majority of Tor crypto keys could be broken by NSA, researcher says: The majority of devices connected to the Tor privacy service may be using encryption keys that can be broken by the National Security Agency, a security researcher has speculated. Rob Graham, CEO of penetration testing firm Errata Security, arrived at that conclusion by […]

  • September 8, 2013

    Legislation Seeks to Bar N.S.A. Tactic in Encryption

    Legislation Seeks to Bar N.S.A. Tactic in Encryption: Representative Rush D. Holt, a New Jersey Democrat who is also a physicist, said Friday that he believed the N.S.A. was overreaching and could hurt American interests, including the reputations of American companies whose products the agency may have altered or influenced. “We pay them to spy,” […]

  • September 8, 2013

    After NSA encryption

    After NSA encryption: News that the NSA can break or bypass a variety of digital encryption tools has researchers second-guessing the strength of Internet security products they previously trusted, and wondering exactly who else, besides the feds, may be listening in. In the latest revelation about the NSA’s activities, The Guardian, the New York Times, and […]

  • September 8, 2013

    Dear stupid, stupid NSA

    Dear stupid, stupid NSA: Dear stupid, stupid NSA, I’ve got to hand it to you: as an agency set up with the task of breaking codes and spying on people, you seem to be doing a pretty sterling job. You and your counterparts in the UK, Australia, Canada and New Zealand (and possibly elsewhere) are […]

  • September 8, 2013

    DEA Has Access to Billions of AT&T Phone Call Records

    DEA Has Access to Billions of AT&T Phone Call Records: The United States Drug Enforcement Agency’s (DEA) efforts to stay ahead of drug dealers has, according to a New York Times report, helped launch one of the most unusual and wide-ranging phone-record access programs seen yet. According to a report in the Sunday Times, the […]

  • September 8, 2013

    Security Firm Bit9 Hacked, Used to Spread Malware

    Security Firm Bit9 Hacked, Used to Spread Malware: Bit9 told a source for KrebsOnSecurity that their corporate networks had been breached by a cyberattack. According to the source, Bit9 said they’d received reports that some customers had discovered malware inside of their own Bit9-protected networks, malware that was digitally signed by Bit9′s own encryption keys. […]

  • September 7, 2013

    What Every CFO Should Know About Security Breaches

    What Every CFO Should Know About Security Breaches: “The Ponemon Institute estimates that the cost of the average data breach — the average, mind you — is over $5 million,” said Len Moodispaw, CEO of KEYW, a consulting firm that focuses on cybersecurity and counter-terrorism defense. “What that says is that it pays to make […]

Categories

  • Hacks and Incidents
  • Security News
  • Security Techniques
  • Uncategorized

Copyright © 2025 by ISGroup SRL - All Rights Reserved