Hacking a smart home with a laser

Alexa

In this video we will discover how you can enter a smart home that uses Alexa or Google Home. We are talking above all about those who use these smart systems to open or close gates, garages, armored doors, windows and shutters. One piece of advice we want to give you is obviously not to put microphones in your home like Alexa or Google... Continue reading Hackerare una smart home con un laser

Pentagon warns US military not to use DNA test kits

DNA

According to the Telegraph, the Pentagon is inviting the United States military not to use DNA test kits (to discover genetic diseases for example, but also to discover ancestors) which many know, have used or intend to use and/ or give away. This is because the Pentagon thinks it would be jeopardized… Continue reading Il Pentagono avvisa i militari statunitensi di non utilizzare i kit per i test del DNA [EN]

Some Chinese hackers have managed to bypass two-factor authentication

Hackers

Fox-It security researchers have discovered that a hacking group linked to the Chinese government managed to bypass the two-factor authentication (2Fa) security mechanism. 2Fa is a security feature designed to ensure that only one user can access their account even if the password is discovered... Continue reading Alcuni hacker cinesi sono riusciti a superare l’autenticazione a due fattori

Cyberterrorism, the risk of attacks shifts to trains

Radical servers

With air traffic made relatively safe thanks to innovative technologies and new control procedures, the danger of large-scale terrorist attacks risks transferring to trains. And it is still a burning risk, more than fifteen years after the Madrid massacre of 11 March 2004 when ten bombs exploded in four... Continue reading Cyberterrorismo, il rischio attentati si sposta sui treni

There is a security flaw in the latest generation Intel processors

Processor

Yet another vulnerability problem that comes to light in this nefarious 2019 in terms of cybersecurity. The protagonists in this case are some latest generation Intel processors which may be subject to a bug which exposes the entire system to potential attacks by malicious actors. Several chip manufacturers allow users to manually adjust… Continue reading C’è una falla di sicurezza nei processori Intel di ultima generazione

7 million Adobe Creative Cloud accounts hacked [EN]

Alternatives to Google Password

An open cloud database sets the stage for phishing attacks for users of the subscription service. Nearly 7.5 million Adobe Creative Cloud users are left open to phishing campaigns after their records were left exposed to the internet. Adobe Creative Cloud, which has an estimated 15 million subscribers, is a monthly service that gives users… Continue reading 7 milioni di account Adobe Creative Cloud violati [EN]

IOT, Whirpool user data exposed in clear text [EN]

IOT

Another day, another shining example of why connecting everything from your Barbie dolls to tea kettles to the internet was a bad idea. This week it's Whirlpool that's under fire after a researcher discovered that the company had failed to secure a database containing 28 million records collected from the company's “smart” appliances. The database… Continue reading IOT, i dati degli utenti di Whirpool esposti in chiaro [EN]

Because the man who “turned on” the internet 50 years ago doesn't like how it turned out

Internet

The Internet has changed the world. It's banal to say it now, but it's a revolution that began fifty years ago, exactly. Among the many epochal phenomena in human history, we even know the precise minute in which it began: at 10.30 pm on October 29, 1969. At that moment the first message was sent between a computer and a… Continue reading Perché all’uomo che ha “acceso” internet 50 anni fa non piace com’è andata a finire

Unicredit, the data of 3 million customers compromised

Alternatives to Google Password

The UniCredit IT security team identified a case of unauthorized access to data relating to a file generated in 2015. This file contained approximately 3 million records, referring to the Italian perimeter, and was composed only of names, cities, telephone and email. We read it in a note from… Continue reading Unicredit, compromessi i dati di 3 milioni di clienti

What is a web tracker? [EN]

Alternatives to Google Docs

Let's say you're on an outdoor pizza oven website dreaming about someday owning one. Mmm pizza. Next you switch gears and visit a fitness site; low and behold an ad for the pizza oven you were just looking at is there, too. Then you go to YouTube to see how easy it would be to… Continue reading Cosa è un web tracker? [EN]