Soluzioni per l'analisi della Sicurezza Informatica
  • ISGroup Independent Research [EN]
  • ISGroup Partner per la sicurezza [IT]
  • August 28, 2013

    Chang Wanquan: Hacker actions never supported by Chinese military

    Chang Wanquan: Hacker actions never supported by Chinese military: WASHINGTON DC, August 20 (ChinaMil) — Chang Wanquan, state councilor and defense minister of the People’s Republic of China (PRC) who is on an official friendly visit to the U.S., expressed China’s stand on network security issues by using the word “oppose” for five times on August […]

  • August 28, 2013

    CreepyDOL WiFi surveillance project debuts at Blackhat/DEFCON

    CreepyDOL WiFi surveillance project debuts at Blackhat/DEFCON: CreepyDOL, the Creepy Digital Object Locator, is a distributed tracking system that uses low-cost hardware sensors, a robust communications system, and simple observation to give near-real-time identification of humans and tracking capabilities to anyone. It’s goal is to develop hardware and software for passive surveillance of WiFi data and […]

  • August 28, 2013

    Pinterest And StumbleUpon patch critical flaws that could have exposed over 100 million users’ email addresses

    Pinterest And StumbleUpon patch critical flaws that could have exposed over 100 million users’ email addresses: Pinterest and StumbleUpon have patched critical vulnerabilities in their services that could have enabled an attacker to discover users’ email addresses. The flaws, discovered by security researcher Dan Melamed, were quite simple to exploit and could have been employed to […]

  • August 28, 2013

    Syrian Electronic Army implicated in Twitter, New York Times attacks

    Syrian Electronic Army implicated in Twitter, New York Times attacks: The Syrian Electronic Army apparently took control over the Twitter.com Web site address record Tuesday, the hacker group’s latest attack on high-profile Internet sites. The Twitter.com whois record, which lists the owner of the Web address names called domains, listed the owner’s e-mail address as sea@sea.sy. […]

  • August 28, 2013

    How Snowden did it

    How Snowden did it: When Edward Snowden stole the crown jewels of the National Security Agency, he didn’t need to use any sophisticated devices or software or go around any computer firewall. All he needed, said multiple intelligence community sources, was a few thumb drives and the willingness to exploit a gaping hole in an antiquated […]

  • August 28, 2013

    NSA paid millions to cover Prism compliance costs for tech companies

    NSA paid millions to cover Prism compliance costs for tech companies: The National Security Agency paid millions of dollars to cover the costs of major internet companies involved in the Prism surveillance program after a court ruled that some of the agency’s activities were unconstitutional, according to top-secret material passed to the Guardian. The technology companies, […]

  • August 28, 2013

    LinkedIn Member Passwords Compromised

    LinkedIn Member Passwords Compromised: We want to provide you with an update on this morning’s reports of stolen passwords. We can confirm that some of the passwords that were compromised correspond to LinkedIn accounts. [..] Members that have accounts associated with the compromised passwords will notice that their LinkedIn account password is no longer valid.

  • August 28, 2013

    Network Security Remains a Blind Spot for Businesses

    Network Security Remains a Blind Spot for Businesses: Many enterprises possess an unrealistic confidence surrounding the security of their networks, with more than 65 percent of IT/security professionals contacted for a survey by network visibility and security intelligence specialist Landcope not thinking or being unsure that they had experienced any security incidents within the last 12 […]

  • August 28, 2013

    Chinese Ransomlock Malware Changes Windows Login Credentials

    Chinese Ransomlock Malware Changes Windows Login Credentials: Although ransomware has become an international problem, we rarely see Chinese versions. Recently, Symantec Security Response noticed a new type of ransomlock malware that not only originates from China but also uses a new ransom technique to force users into paying to have their computers unlocked. This threat is […]

  • August 28, 2013

    Stern new data breach reporting requirement takes hold in EU

    Stern new data breach reporting requirement takes hold in EU: Data breaches are reported nearly every day and one noticeable trend is the occasional delay between when the breach is discovered and when authorities and affected people are notified. That just changed in the 28 member-European Union (EU). As of Sunday, telecommunications and internet service providers […]

Categories

  • Hacks and Incidents
  • Security News
  • Security Techniques
  • Uncategorized

Copyright © 2025 by ISGroup SRL - All Rights Reserved