Cybersec Customer Success 21/December/2021 A philosophy for quality customer service in the information security market This article addresses this scenario and shares some proposals for achieving this goal
Software Engineering 17/December/2021 A Web Accessibility: how to modify our projects today In this blogpost, we'll address directions and techniques that can be incorporated into our web projects
Web Application Security 18/August/2021 URL Filter Subversion How failures related to validating conditions based on URLs can lead to security issues
Cryptography 12/December/2019 Evil Maid: Attack on computers with encrypted disks The attack allows to obtain data stored on a disk or even to gain remote access to the victim’s computer
Intelligence 17/September/2019 Research identifies tool used to extract and manipulate email attachments Offered in social networks, tool also allows to validate email credentials
Vulnerability Disclosure 20/August/2019 Trend Micro Maximum Security 2019 vulnerability allows for privilege escalation attacks on Windows Discovered by Tempest analyst, the flaw had a fix released last week
Vulnerability Disclosure 31/July/2019 Vulnerability in Avira Security Suite enables for privilege escalation attacks The flaw is present in a file which, by default, has open access and control permissions for all Windows users
Vulnerability Disclosure 08/January/2018 Password manager flaw allows for arbitrary command execution The flaw was found in the latest version of the software (4.9.3)
Intelligence 18/October/2017 HydraPOS — Operation of Brazilian fraudsters has accumulated, at least, 1.4 million card data Fraud scheme went unnoticed for four years, targeting several merchants in Brazil
Uncategorized 16/June/2017 Pacemakers may be vulnerable to cyberattacks, study finds More than 8,000 vulnerabilities have been discovered in several models. In the UK the number of implanted devices exceeds 400 per million inhabitants
Uncategorized 05/June/2017 Android: failures that are beyond the code In which ways the appropriation of the Android ecosystem affects its security
Uncategorized 26/May/2017 Increase in ‘CEO Fraud’ attacks highlights risks to corporate environments The number of BEC (Business Email Compromise) attacks has grown about 55% in 2015 in comparison with the previous year
News 18/May/2017 Inspeckage, mobile application software analysis, has Tempest’s official support This stamp represents the partnership between Tempest and Antonio Martins, developer of the tool and mobile application anaylsis specialist
Uncategorized 28/April/2017 Security incident on corporate chat tool HipChat may have exposed users data It has affected their webservers and allowed others unauthorised access to user content
Uncategorized 05/April/2017 USB-based malware raises suspicions of hostile attacks in air-gapped environments The malware has self-protection features based on volume encryption using the AES128 algorithm, which also creates a single image that should prevent cloning the USB device
Uncategorized 14/March/2017 Steganography in Malvertising campaigns: attacks continue to improve These attacks have been active at least since 2014 and contain steganography techniques in their execution
Cybersec Customer Success 21/December/2021 A philosophy for quality customer service in the information security market This article addresses this scenario and shares some proposals for achieving this goal
Software Engineering 17/December/2021 A Web Accessibility: how to modify our projects today In this blogpost, we'll address directions and techniques that can be incorporated into our web projects
Web Application Security 18/August/2021 URL Filter Subversion How failures related to validating conditions based on URLs can lead to security issues
Cryptography 12/December/2019 Evil Maid: Attack on computers with encrypted disks The attack allows to obtain data stored on a disk or even to gain remote access to the victim’s computer
Intelligence 17/September/2019 Research identifies tool used to extract and manipulate email attachments Offered in social networks, tool also allows to validate email credentials
Vulnerability Disclosure 20/August/2019 Trend Micro Maximum Security 2019 vulnerability allows for privilege escalation attacks on Windows Discovered by Tempest analyst, the flaw had a fix released last week
Vulnerability Disclosure 31/July/2019 Vulnerability in Avira Security Suite enables for privilege escalation attacks The flaw is present in a file which, by default, has open access and control permissions for all Windows users
Vulnerability Disclosure 08/January/2018 Password manager flaw allows for arbitrary command execution The flaw was found in the latest version of the software (4.9.3)
Intelligence 18/October/2017 HydraPOS — Operation of Brazilian fraudsters has accumulated, at least, 1.4 million card data Fraud scheme went unnoticed for four years, targeting several merchants in Brazil
Uncategorized 16/June/2017 Pacemakers may be vulnerable to cyberattacks, study finds More than 8,000 vulnerabilities have been discovered in several models. In the UK the number of implanted devices exceeds 400 per million inhabitants
Uncategorized 05/June/2017 Android: failures that are beyond the code In which ways the appropriation of the Android ecosystem affects its security
Uncategorized 26/May/2017 Increase in ‘CEO Fraud’ attacks highlights risks to corporate environments The number of BEC (Business Email Compromise) attacks has grown about 55% in 2015 in comparison with the previous year
News 18/May/2017 Inspeckage, mobile application software analysis, has Tempest’s official support This stamp represents the partnership between Tempest and Antonio Martins, developer of the tool and mobile application anaylsis specialist
Uncategorized 28/April/2017 Security incident on corporate chat tool HipChat may have exposed users data It has affected their webservers and allowed others unauthorised access to user content
Uncategorized 05/April/2017 USB-based malware raises suspicions of hostile attacks in air-gapped environments The malware has self-protection features based on volume encryption using the AES128 algorithm, which also creates a single image that should prevent cloning the USB device
Uncategorized 14/March/2017 Steganography in Malvertising campaigns: attacks continue to improve These attacks have been active at least since 2014 and contain steganography techniques in their execution