Breaking News

Pierluigi Paganini June 23, 2016
Godless, the Android Malware that employs multiple rooting exploits

Godless is a new strain of Android Malware recently spotted by experts from Trend Micro that leverages multiple rooting exploits. Godless is a new strain of malware that uses multiple rooting exploit to compromise Android mobile devices. The mobile malware is a sort of hacking platform that includes an open-source rooting framework called android-rooting-tools. The […]

Pierluigi Paganini June 22, 2016
Ops … also Zuckerberg covers the webcam with tapes

Like the FBI Director Comey also Zuckerberg use tapes to cover the webcam of his laptop, evidently he fear that someone could spy on him. A Facebook post published by Mark Zuckerberg to celebrate more than 500 million people now use Instagram is attracting the attention of IT experts. In the image that is included in the […]

Pierluigi Paganini June 22, 2016
Pawost Android Malware uses Google Talk to make unwanted phone calls

Researchers at MalwareBytes have spotted a new Android Malware dubbed Pawost that uses Google Talk to make unwanted phone calls. Security experts from MalwareBytes have spotted a new strain of Android malware, dubbed Android/Trojan.Pawost, that implements an unusual feature. The Pawost threat originates from China and is able to use Google Talk to make malicious phone […]

Pierluigi Paganini June 22, 2016
Conficker, the malware with the most wide spread diffusion

Conficker (also known as Downup, Downadup e Kido) is one of the oldest and still active malware, according to Check Point researchers it is  “the most prominent family accounting for 14 percent of recognized attacks.” Conficker is technically a worm that leverages a vulnerability in the Windows Server Service to spread itself, it targets an […]

Pierluigi Paganini June 22, 2016
Tech coalition asked to roll back changes to Rule 41 that allows FBI mass hacking

A coalition of tech groups asked the Congress to roll back changes to Rule 41 that allowed law enforcement to do mass hacking. Congress should block the changes to the rules for the regulation of US law enforcement investigations. The rules allow law enforcement agencies hacking in computers worldwide for its investigation. In April, the […]

Pierluigi Paganini June 21, 2016
Exploit kit traffic drops by 96% since April, what is happening?

The exploit kit landscape is rapidly changing,the Angler and Nuclear EK disappeared and overall malicious traffic drops by 96% since April. As highlighted by security experts the threat landscape is in continuous evolution, despite the criminal underground was monopolized by Angler and Nuclear exploit kits for several years other EKs represent a serious threat to online […]

Pierluigi Paganini June 21, 2016
BadTunnel attack could have the widest impact in the history of Windows

A Chinese security researcher has discovered a Windows design flaw dubbed BadTunnel that affects all versions of Windows. The Chinese researcher Yang Yu, director of Xuanwu Lab of Tencent has discovered a design flaw in Microsoft Windows that affects all versions of the popular operating system. The vulnerability could allow an attacker to hijack a target organization’s […]

Pierluigi Paganini June 21, 2016
Apple patched a mysterious flaw in Apple AirPort devices

Apple issued a security update to fix a nine-month-old DNS parsing flaw affecting Apple AirPort routers but avoided providing further info on the issue. Apple has issued a security update to fix a nine-month-old DNS parsing vulnerability affecting its AirPort routers. Apple has released a firmware update 7.6.7 and 7.7.7 that runs on  AirPort Express, AirPort Extreme and […]

Pierluigi Paganini June 21, 2016
Acer confirms a data breach at its E-commerce site

The Taiwanese electronics company Acer informed its customers that some of their sensitive financial data may have been accessed by hackers. The Taiwanese IT giant Acer recently confirmed to California’s Attorney General (AG) that unknown hackers compromised its online store and accessed customers’ sensitive data. The leaked data includes credit card numbers, expiry dates, CVC security […]

Pierluigi Paganini June 20, 2016
Hardened Tor Browser implements the Selfrando feature to defeat exploits

Earlier June the Tor Project announced a hardened version of the popular Tor Browser that implements a feature dubbed Selfrando to defeat exploits. Early June the Tor Project announced a hardened version of the popular Tor Browser, the Tor Browser 6.5a1-hardened. “A new hardened Tor Browser release is available. It can be found in the 6.5a1-hardened […]