Breaking News

Pierluigi Paganini June 15, 2016
CVE-2016-4171 – Another Flash Zero-Day exploited in targeted attacks

Adobe states that the Flash Player zero-day vulnerability (CVE-2016-4171) has been exploited in targeted attacks. It will be fixed later this week. Once again Adobe Flash Player is the target of hackers in the wild. Adobe has released security updates for several of its products announcing that the fix for a critical Flash Player zero-day vulnerability […]

Pierluigi Paganini June 14, 2016
Hack the Pentagon, hackers already found more than 100 flaws

Hackers contracted by the DoD under the Hack the Pentagon initiative have found more than 100 vulnerabilities exceeding Government’s expectations. Do you remember the ‘Hack the Pentagon‘ initiative? ‘Hack the Pentagon’ is the initiative launched by the US Government this year to test the resilience to cyber attacks of the US defenses. The Pentagon has launched the […]

Pierluigi Paganini June 14, 2016
Watch out, FLocker Ransomware targets Android smart TVs

The day has come, Sharp and Philips smart TV running the Android TV OS could be infected by a ransomware dubbed FLocker ransomware. When a journalist asked me which is a possible evolution of ransomware I had no doubt, the Internet of Things. I was thinking of ransomware that infects medical devices and Smart objects in our homes. […]

Pierluigi Paganini June 14, 2016
Crooks can clone payments cards with a hi-tech contactless device

Cyber criminals are offering for sale a hi-tech gadget named Contactless Infusion X5t to scan nearby contactless payment cards and clone them. The British Daily Mail published an interesting article on a new gadget used by crooks to clone up to 15 contactless bank cards a second from victims, and it can do it by […]

Pierluigi Paganini June 14, 2016
‘Hacking Team’ and heterogony of ends: how the hack of Phineas Fisher can lead to unwanted worst consequences for the evolution of the Surveillance Tools and State Spyware.

The “heterogony of end” is a famous expression formulated in 1886 by the German philosopher Wihelm Wundt, what about the Hacking Team case? After the hack of the controversial government spying and hacking tool vendor Hacking Team by an outside attacker, a large  numbers of media headlines worldwide reported the events. [1,2,3] The hacker announced […]

Pierluigi Paganini June 13, 2016
North Korean Hackers stole defense documents and photos from South

The Government of Seoul reported that North Korean Hackers stole defense-related documents and photos from two South Korean companies. The news that North Korean hackers have stolen thousands of records from private firms and state agencies in the South Korea is not new. In the last wave of attacks, the North Korean hackers have stolen […]

Pierluigi Paganini June 13, 2016
Singapore will isolate Government Computers from the Internet

The Government of Singapore will cut off civil servants’ work computers from the Internet in order to secure Government networks. The Singapore’s prime Minister Lee Hsien Loong confirmed this week that the Government would disconnect from the Internet government work stations within a year for security reasons. The measure was aimed at preventing cyber attacks that […]

Pierluigi Paganini June 13, 2016
Exclusive: Critical vulnerability found on Twitter?

The newfound critical vulnerability on Twitter seems to allow remote code execution! Which is the reason behind the recent Twitter security issues? The newfound critical vulnerability on Twitter seems to allow remote code execution! The last days we have seen some cases that have to do with Twitter’s security making us wonder if the famous […]

Pierluigi Paganini June 13, 2016
The NSA wants to exploit IoT devices for surveillance and sabotage

The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance and sabotage. Intelligence agencies worldwide are looking with increasing interest to the Internet of Things paradigm, intelligent objects surround us and manage an impressive volume of data related to of existence. Thanks to the Internet of Things devices, we […]

Pierluigi Paganini June 12, 2016
WauchulaGhost targets ISIS Twitter Accounts and floods them with porn images

WauchulaGhost Hacker groups linked to Anonymous hijack ISIS supporters’ Twitter accounts and flood their profiles with PORN picture and irreverent messages. Anonymous is continuing its online battle against the ISIS propaganda machine, this time, Twitter accounts managed by the terrorist organization have been flooded with a large number of pornographic posts. It seems that the attacks […]