Malware found preinstalled in classic push-button phones sold in Russia
In a report published this week by a Russian security researcher named ValdikSS, push-button phones such as DEXP SD2810, Itel it2160, Irbis SF63, and F+ Flip 3 were caught subscribing users to premium SMS services and intercepting incoming SMS messages to prevent detection.
https://therecord.media/malware-found-preinstalled-in-classic-push-button-phones-sold-in-russia/
In a report published this week by a Russian security researcher named ValdikSS, push-button phones such as DEXP SD2810, Itel it2160, Irbis SF63, and F+ Flip 3 were caught subscribing users to premium SMS services and intercepting incoming SMS messages to prevent detection.
https://therecord.media/malware-found-preinstalled-in-classic-push-button-phones-sold-in-russia/
therecord.media
Malware found preinstalled in classic push-button phones sold in Russia
A security researcher has discovered malicious code inside the firmware of four low-budget push-button mobile phones sold through Russian online stores.
Forwarded from Informa Pirata: informazione e notizie
"La paura ci ha resi vulnerabili"
Ci sono voluti Edward #Snowden e altri #whistleblower per rivelare l'incredibile portata dello #spionaggio del governo sulla sua stessa gente quando i controlli istituzionali sono falliti
Di Ed #Pilkington su #TheGuardian
https://www.theguardian.com/world/2021/sep/04/surveillance-state-september-11-panic-made-us-vulnerable
Ci sono voluti Edward #Snowden e altri #whistleblower per rivelare l'incredibile portata dello #spionaggio del governo sulla sua stessa gente quando i controlli istituzionali sono falliti
Di Ed #Pilkington su #TheGuardian
https://www.theguardian.com/world/2021/sep/04/surveillance-state-september-11-panic-made-us-vulnerable
the Guardian
‘Panic made us vulnerable’: how 9/11 made the US surveillance state – and the Americans who fought back
It took Edward Snowden and other whistleblowers to reveal the staggering extent of the government’s spying on its own people as institutional checks failed
NOTA EDITORIALE DEL CANALE
Qualcuno ha fatto notare la pubblicazione "discontinua" di contenuti su questo canale.
Il motivo è presto detto: ogni link viene verificato e il contenuto controllato. Pubblichiamo solo links attendibili e comunque attinenti alle tematiche di privacy, tecnologia e sicurezza trattate in questo canale.
Preferiamo puntare sulla qualità che sulla quantità.
Spero lo apprezziate.
Michele "O-Zone" Pinassi
Qualcuno ha fatto notare la pubblicazione "discontinua" di contenuti su questo canale.
Il motivo è presto detto: ogni link viene verificato e il contenuto controllato. Pubblichiamo solo links attendibili e comunque attinenti alle tematiche di privacy, tecnologia e sicurezza trattate in questo canale.
Preferiamo puntare sulla qualità che sulla quantità.
Spero lo apprezziate.
Michele "O-Zone" Pinassi
security.txt helper
“When security risks in web services are discovered by independent security researchers who understand the severity of the risk, they often lack the channels to disclose them properly. As a result, security issues may be left unreported. security.txt defines a standard to help organizations define the process for security researchers to disclose security vulnerabilities securely.”
https://securitytxt.org/
“When security risks in web services are discovered by independent security researchers who understand the severity of the risk, they often lack the channels to disclose them properly. As a result, security issues may be left unreported. security.txt defines a standard to help organizations define the process for security researchers to disclose security vulnerabilities securely.”
https://securitytxt.org/
security.txt
A proposed standard that allows websites to define security policies.
Software piracy pushes companies to be more competitive, study claims
"When comparing the IP strategies of software firms at risk of piracy (the treatment group) against those of not-at-risk firms (the control group), we find that our treatment group significantly increases its innovative activity after the piracy shock in terms of R&D expenditures and granted copyright, trademark, and patent applications," their paper says.
https://www.theregister.com/2021/09/04/software_piracy_competitive/
"When comparing the IP strategies of software firms at risk of piracy (the treatment group) against those of not-at-risk firms (the control group), we find that our treatment group significantly increases its innovative activity after the piracy shock in terms of R&D expenditures and granted copyright, trademark, and patent applications," their paper says.
https://www.theregister.com/2021/09/04/software_piracy_competitive/
The Register
Software piracy pushes companies to be more competitive, study claims
So, do copy that floppy?
Become a better developer with GitPals
We are connecting you with other developers, whose projects match your skills. Choose any project that matches your skills and start your path in an open-source development
https://www.gitpals.com
We are connecting you with other developers, whose projects match your skills. Choose any project that matches your skills and start your path in an open-source development
https://www.gitpals.com
Study about the impact of open source software and hardware on technological independence, competitiveness and innovation in the EU economy
The objective of the study was to investigate and quantify the economic impact of OSS and OSH on the European economy. The study also identified strengths, weaknesses, opportunities and challenges of open source in relevant ICT policies, such as cybersecurity, artificial intelligence (AI), digitising European industry, the connected car, high performance computing, big data, distributed ledger technologies, and more.
https://digital-strategy.ec.europa.eu/en/library/study-about-impact-open-source-software-and-hardware-technological-independence-competitiveness-and
The objective of the study was to investigate and quantify the economic impact of OSS and OSH on the European economy. The study also identified strengths, weaknesses, opportunities and challenges of open source in relevant ICT policies, such as cybersecurity, artificial intelligence (AI), digitising European industry, the connected car, high performance computing, big data, distributed ledger technologies, and more.
https://digital-strategy.ec.europa.eu/en/library/study-about-impact-open-source-software-and-hardware-technological-independence-competitiveness-and
In Italia boom di attacchi hacker ai dispositivi IoT: +93% in sei mesi
"Le persone credono di non essere abbastanza importanti per essere vittima di un hacker, ma nell’ultimo anno abbiamo potuto osservare un grande aumento degli attacchi verso i dispositivi IoT. La maggior parte di questi attacchi si può prevenire, ecco perché consigliamo ai possessori di smart home di installare una soluzione di sicurezza affidabile, che li aiuti a proteggersi”
https://www.corrierecomunicazioni.it/cyber-security/in-italia-boom-di-attacchi-hacker-ai-dispositivi-iot-93-in-sei-mesi/
"Le persone credono di non essere abbastanza importanti per essere vittima di un hacker, ma nell’ultimo anno abbiamo potuto osservare un grande aumento degli attacchi verso i dispositivi IoT. La maggior parte di questi attacchi si può prevenire, ecco perché consigliamo ai possessori di smart home di installare una soluzione di sicurezza affidabile, che li aiuti a proteggersi”
https://www.corrierecomunicazioni.it/cyber-security/in-italia-boom-di-attacchi-hacker-ai-dispositivi-iot-93-in-sei-mesi/
CorCom
Internet of things, in Italia boom di attacchi ai device : +93% in sei mesi
Rilevazioni Kaspersky: nel primo semestre 2021 le intrusioni hanno superato quota 3,6 milioni a fronte di 1,9 del secondo del 2020. Sugli scudi smartwatch e fitness tracker
ProtonMail Shares Activist's IP Address With Authorities Despite Its "No Log" Claims
Crollo di un "mito"?
The Switzerland-based company said it received a "legally binding order from the Swiss Federal Department of Justice" related to a collective called Youth for Climate, which it was "obligated to comply with," compelling it to handover the IP address and information related to the type of device used by the group to access the ProtonMail account.
https://thehackernews.com/2021/09/protonmail-shares-activists-ip-address.html
Crollo di un "mito"?
The Switzerland-based company said it received a "legally binding order from the Swiss Federal Department of Justice" related to a collective called Youth for Climate, which it was "obligated to comply with," compelling it to handover the IP address and information related to the type of device used by the group to access the ProtonMail account.
https://thehackernews.com/2021/09/protonmail-shares-activists-ip-address.html
Health campaign: 20 squats for a free bus ride in Cluj-Napoca
The "health ticket" campaign, which allows residents of Cluj-Napoca to get a free bus ride by doing 20 squats, has kicked off again in the Transylvanian city.
https://www.romania-insider.com/health-ticket-campaign-cluj-napoca-2021
The "health ticket" campaign, which allows residents of Cluj-Napoca to get a free bus ride by doing 20 squats, has kicked off again in the Transylvanian city.
https://www.romania-insider.com/health-ticket-campaign-cluj-napoca-2021
Romania Insider
Health campaign: 20 squats for a free bus ride in Cluj-Napoca
The "health ticket" campaign, which allows residents of Cluj-Napoca to get a free bus ride by doing 20 squats, has kicked off again in the Transylvanian city. Starting Monday, August 23, Cluj-Napoca residents who accept the challenge of doing 20 squats get…
Open source software boosted the EU economy by ‘between €65 to €95 bn’ – report
The study assessed the impact of open source software and hardware on the European economy. It estimated that European companies had invested €1 bn in open source software in 2018, resulting in an additional economic output of between €65 and €95 bn, the equivalent of air and water transport combined.
https://www.euractiv.com/section/digital/news/open-source-software-boosted-the-eu-economy-by-between-e65-to-e95-bn-report/
The study assessed the impact of open source software and hardware on the European economy. It estimated that European companies had invested €1 bn in open source software in 2018, resulting in an additional economic output of between €65 and €95 bn, the equivalent of air and water transport combined.
https://www.euractiv.com/section/digital/news/open-source-software-boosted-the-eu-economy-by-between-e65-to-e95-bn-report/
EURACTIV
Open source software boosted the EU economy by ‘between €65 to €95 bn’ – report
Open source software boosted the European Union’s GDP by between €65 to €95 bn in 2018, a new report published by the European Commission on Monday (6 September) has shown, but warned that the EU should do more to actively promote open technologies.
Auto connesse, chi le attacca e come?
Lo scenario è inquietante: immaginate di essere alla guida della vostra auto quando una voce dagli altoparlanti vi avvisa che siete stati hackerati e il veicolo comincia a non rispondere ai vostri comandi.
Per meglio comprendere quanto siano esposte al rischio di attacco le auto connesse, invito alla lettura di un interessante rapporto pubblicato da Upstream Security dal titolo “Global Automotive Cybersecurity Report”.
https://www.repubblica.it/tecnologia/blog/sicuri-nella-rete/2021/09/06/news/auto_connesse_chi_le_attacca_e_come_-316698237/
Lo scenario è inquietante: immaginate di essere alla guida della vostra auto quando una voce dagli altoparlanti vi avvisa che siete stati hackerati e il veicolo comincia a non rispondere ai vostri comandi.
Per meglio comprendere quanto siano esposte al rischio di attacco le auto connesse, invito alla lettura di un interessante rapporto pubblicato da Upstream Security dal titolo “Global Automotive Cybersecurity Report”.
https://www.repubblica.it/tecnologia/blog/sicuri-nella-rete/2021/09/06/news/auto_connesse_chi_le_attacca_e_come_-316698237/
la Repubblica
Auto connesse, chi le attacca e come?
Ci siamo già dimenticati degli attacchi #ransomware #DoppelPaymer ad alcuni comuni italiani del nord-Italia?
Interessante, ad esempio, l'elenco delle macchine del Comune di #CaselleTorinese: se confermato, tutte in contrasto sia con le #MisureMinimeSicurezzaICT per le #PA che del semplice buonsenso.
Interessante, ad esempio, l'elenco delle macchine del Comune di #CaselleTorinese: se confermato, tutte in contrasto sia con le #MisureMinimeSicurezzaICT per le #PA che del semplice buonsenso.
Microsoft warns of new IE zero-day exploited in targeted Office attacks
Microsoft’s security team issued an alert earlier today to warn about a new Internet Explorer zero-day that is being abused in real-world attacks.
Tracked as CVE-2021-40444, the vulnerability impacts Microsoft MHTML, also known as Trident, the Internet Explorer browser engine.
https://therecord.media/microsoft-warns-of-new-ie-zero-day-exploited-in-targeted-office-attacks/
Microsoft’s security team issued an alert earlier today to warn about a new Internet Explorer zero-day that is being abused in real-world attacks.
Tracked as CVE-2021-40444, the vulnerability impacts Microsoft MHTML, also known as Trident, the Internet Explorer browser engine.
https://therecord.media/microsoft-warns-of-new-ie-zero-day-exploited-in-targeted-office-attacks/
therecord.media
Microsoft warns of new IE zero-day exploited in targeted Office attacks
Microsoft\'s security team issued an alert earlier today to warn about a new Internet Explorer zero-day that is being abused in real-world attacks.
Data Breach: 7 milioni di dati personali israeliani rubati
Un criminale informatico noto come “sangkanicil” afferma di aver rubato le informazioni personali di circa 7 milioni di israeliani, circa l’80% della popolazione e offre i dati in vendita online, senza rivelare il prezzo richiesto. (Israel Times)
https://www.insicurezzadigitale.com/data-breach-7-milioni-di-dati-personali-israeliani-rubati/
Un criminale informatico noto come “sangkanicil” afferma di aver rubato le informazioni personali di circa 7 milioni di israeliani, circa l’80% della popolazione e offre i dati in vendita online, senza rivelare il prezzo richiesto. (Israel Times)
https://www.insicurezzadigitale.com/data-breach-7-milioni-di-dati-personali-israeliani-rubati/
(in)sicurezza digitale
Data Breach: 7 milioni di dati personali israeliani rubati - (in)sicurezza digitale
Attore di minacce afferma di aver rubato 7 MILIONI di dati personali di Israele: la più grande violazione nella storia della nazione.
How Facebook Undermines Privacy Protections for Its 2 Billion WhatsApp Users
Zuckerberg’s vision centered on WhatsApp’s signature feature, which he said the company was planning to apply to Instagram and Facebook Messenger: end-to-end encryption, which converts all messages into an unreadable format that is only unlocked when they reach their intended destinations. WhatsApp messages are so secure, he said, that nobody else — not even the company — can read a word. As Zuckerberg had put it earlier, in testimony to the U.S. Senate in 2018, “We don’t see any of the content in WhatsApp.”
https://www.propublica.org/article/how-facebook-undermines-privacy-protections-for-its-2-billion-whatsapp-users
Zuckerberg’s vision centered on WhatsApp’s signature feature, which he said the company was planning to apply to Instagram and Facebook Messenger: end-to-end encryption, which converts all messages into an unreadable format that is only unlocked when they reach their intended destinations. WhatsApp messages are so secure, he said, that nobody else — not even the company — can read a word. As Zuckerberg had put it earlier, in testimony to the U.S. Senate in 2018, “We don’t see any of the content in WhatsApp.”
https://www.propublica.org/article/how-facebook-undermines-privacy-protections-for-its-2-billion-whatsapp-users
ProPublica
How Facebook Undermines Privacy Protections for Its 2 Billion WhatsApp Users
WhatsApp assures users that no one can see their messages — but the company has an extensive monitoring operation and regularly shares personal information with prosecutors.
Cosa ha deciso il governo sul cloud nazionale. E cosa manca ancora
Migrare sul cloud i dati di almeno il 75% degli uffici pubblici italiani entro il 2025. È questo l’obiettivo finale che si è dato il governo Draghi nella sua prima traccia della strategia per il cloud nazionale. Un documento che fissa principi e linee guida degli interventi per trasferire sulla “nuvola” la mole di informazioni oggi parcheggiata in 11mila data center, il 95% dei quali, dall’ultimo censimento dell’Agenzia per l’Italia digitale, ha “carenze nei requisiti minimi di sicurezza, affidabilità, capacità elaborativa ed efficienza”.
https://www.wired.it/economia/business/2021/09/07/cloud-nazionale-data-center-governo-colao/
Migrare sul cloud i dati di almeno il 75% degli uffici pubblici italiani entro il 2025. È questo l’obiettivo finale che si è dato il governo Draghi nella sua prima traccia della strategia per il cloud nazionale. Un documento che fissa principi e linee guida degli interventi per trasferire sulla “nuvola” la mole di informazioni oggi parcheggiata in 11mila data center, il 95% dei quali, dall’ultimo censimento dell’Agenzia per l’Italia digitale, ha “carenze nei requisiti minimi di sicurezza, affidabilità, capacità elaborativa ed efficienza”.
https://www.wired.it/economia/business/2021/09/07/cloud-nazionale-data-center-governo-colao/
WIRED.IT
Cosa ha deciso il governo sul cloud nazionale. E cosa manca ancora
Nel 2022 la gara per il polo strategico nazionale, stanziati 1,9 miliardi per la migrazione dei dati da completare entro il 2025. Ma non ci sono regole chiare sui limiti alle big tech
Elezioni italiane 2018, sotto indagine per presunti brogli il voto in Argentina
Due parlamentari eletti nel 2018 dagli italiani residenti nell’area del consolato di Buenos Aires, in Argentina, sono indagati dalla procura di Roma per presunti brogli elettorali: avrebbero infatti ottenuto il seggio grazie a circa 10 mila schede elettorali falsificate. I voti, sarebbero «stati espressi con identica calligrafia e probabilmente con la medesima penna».
https://irpimedia.irpi.eu/cario-sangregorio-brogli-elettorali-2018/
Due parlamentari eletti nel 2018 dagli italiani residenti nell’area del consolato di Buenos Aires, in Argentina, sono indagati dalla procura di Roma per presunti brogli elettorali: avrebbero infatti ottenuto il seggio grazie a circa 10 mila schede elettorali falsificate. I voti, sarebbero «stati espressi con identica calligrafia e probabilmente con la medesima penna».
https://irpimedia.irpi.eu/cario-sangregorio-brogli-elettorali-2018/
Hackers leak passwords for 500,000 Fortinet VPN accounts
A threat actor has leaked a list of almost 500,000 Fortinet VPN login names and passwords that were allegedly scraped from exploitable devices last summer.
While the threat actor states that the exploited Fortinet vulnerability has since been patched, they claim that many VPN credentials are still valid.
This leak is a serious incident as the VPN credentials could allow threat actors to access a network to perform data exfiltration, install malware, and perform ransomware attacks.
https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/
A threat actor has leaked a list of almost 500,000 Fortinet VPN login names and passwords that were allegedly scraped from exploitable devices last summer.
While the threat actor states that the exploited Fortinet vulnerability has since been patched, they claim that many VPN credentials are still valid.
This leak is a serious incident as the VPN credentials could allow threat actors to access a network to perform data exfiltration, install malware, and perform ransomware attacks.
https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/
BleepingComputer
Hackers leak passwords for 500,000 Fortinet VPN accounts
A threat actor has leaked a list of almost 500,000 Fortinet VPN login names and passwords that were allegedly scraped from exploitable devices last summer.
Introduction to OWASP Top 10 2021
A01:2021-Broken Access Control moves up from the fifth position; 94% of applications were tested for some form of broken access control. The 34 CWEs mapped to Broken Access Control had more occurrences in applications than any other category.
https://owasp.org/Top10/
A01:2021-Broken Access Control moves up from the fifth position; 94% of applications were tested for some form of broken access control. The 34 CWEs mapped to Broken Access Control had more occurrences in applications than any other category.
https://owasp.org/Top10/