Soluzioni per l'analisi della Sicurezza Informatica
  • ISGroup Independent Research [EN]
  • ISGroup Partner per la sicurezza [IT]
  • August 1, 2013

    PIN-Punching Robot Can Crack Your Phone’s Security Code In Less Than 24 Hours

    PIN-Punching Robot Can Crack Your Phone’s Security Code In Less Than 24 Hours: There’s nothing particularly difficult about cracking a smartphone’s four-digit PIN code. All it takes is a pair of thumbs and enough persistence to try all 10,000 combinations. But hackers hoping to save time and avoid arthritis now have a more efficient option: Let […]

  • August 1, 2013

    Android phones playing “I spy” at home and at work

    Android phones playing “I spy” at home and at work: Kindsight, now an Alcatel-Lucent suite of solutions,  has been releasing a quarterly Security Labs Malware Report since May 2012.   Much like the 9900 WNG network analytics enables us to discover mobile data usage trends, Kindsight leverages network-based security analytics to reveal the latest trends on security […]

  • July 23, 2013

    Hack exposes e-mail addresses, password data for 2 million Ubuntu Forum users

    Hack exposes e-mail addresses, password data for 2 million Ubuntu Forum users: E-mail addresses, user names, and password data for every registered user of the Ubuntu Forums—estimated to be 1.82 million accounts—were exposed in a security breach hitting the company responsible for maintaining the freely available, open-source operating system. There’s no sign the compromised data has […]

  • July 23, 2013

    Getting Skimpy With ATM Skimmers

    Getting Skimpy With ATM Skimmers: For example, he told forum members that the main component in the card skimmer as an MSR-605, which is a handheld magnetic stripe reader of the sort that you might find attached to a cash register/point-of-sale machine at a retail clothing store, for example. This ubiquitous device can be had for […]

  • July 23, 2013

    Another Android Master Key Attack Published

    Another Android Master Key Attack Published: A second Android Master Key attack has been reported that takes advantage of the vulnerability in the way Android reads APK files, enabling hackers to modify signed legitimate apps with malware. The vulnerability occurs in the way Android conducts integrity checks on APK files. An attacker could store in a […]

  • July 23, 2013

    1-15 July 2013 Cyber Attacks Timeline

    1-15 July 2013 Cyber Attacks Timeline: This period has been quite hard for the Video Games Industry with two noticeable events targeting Konami and Ubisoft (58 million of account potentially affected in this second case). Another noticeable breach involves the attack against the Italian Website of Sony, which lead to 40,000 records leaked. Regarding hacktivism, Turkey […]

  • July 23, 2013

    Tortilla Open Source Anonymous Traffic Routing Tool for Tor

    Tortilla Open Source Anonymous Traffic Routing Tool for Tor: A researcher with startup Crowdstrike may have bridged those gaps with a tool called Tortilla. Expected to be unveiled at the upcoming Black Hat Briefings in Las Vegas in two weeks, senior security researcher Jason Geffner will not only deliver a presentation on the tool, but will […]

  • July 23, 2013

    Android should embrace a Windows-style security update model

    Android should embrace a Windows-style security update model: When it comes to security, Android 2013 is a lot like Windows in the 1990s and much of the 2000s: A mess. Still, Microsoft got one thing right with security early on. Starting with Windows 98, Microsoft released regular direct-to-user security updates with Patch Tuesday. It’s high time […]

  • July 23, 2013

    UK border police can seize and download your phone’s data for no reason at all

    UK border police can seize and download your phone’s data for no reason at all: Police in the UK have the power to seize mobile devices from any traveler entering the country, and can retain their personal data for as long as they see fit, according to a report from the Telegraph. Such blanket powers are […]

  • July 22, 2013

    Forget BYOD: Bring Your Own Cloud Is a Much Bigger Security Threat

    Forget BYOD — Bring Your Own Cloud Is a Much Bigger Security Threat: The fact that BYOD puts networks and sensitive data at risk is an issue. But the danger has more to do with the software running on the devices than the actual hardware. This is exactly why universities should be shifting the conversation from […]

Categories

  • Hacks and Incidents
  • Security News
  • Security Techniques
  • Uncategorized

Copyright © 2025 by ISGroup SRL - All Rights Reserved