Breaking News

Pierluigi Paganini November 17, 2016
How to Bypass iPhone Passcode and access personal data on the device

A new flaw allows to bypass the iPhone Passcode protection, even when Touch ID is properly configured, and access photos and messages stored on the device. The use of passcode for the protection of users’ data on iPhone Smartphone doesn’t protect users from the possibility that local ill-intentioned will access their data. A new flaw […]

Pierluigi Paganini November 17, 2016
Hacker Interview – Kapustkiy

Today we will speak with Kapustkiy, which continues to be in the headlines due to the recent strings of attacks against embassies. Kapustkiy is a pentester that is targeting organizations and embassies across the world. Recently he breached the Paraguay Embassy of Taiwan (www.embapartwroc.com.tw), while a few days ago the hacker and his friend Kasimierz (@Kasimierz_) hacked the Indian Embassies […]

Pierluigi Paganini November 17, 2016
The Carbanak gang is now targeting the hospitality industry

The notorious Carbanak cybercrime gang is now changing strategy and it is targeting the hospitality and restaurant industries. The notorious Carbanak cybercrime gang that allegedly stole $1 billion from financial institutions worldwide is now changing strategy and target and it is targeting the hospitality and restaurant industries. “In the last month Trustwave was engaged by two separate hospitality clients, and one […]

Pierluigi Paganini November 17, 2016
CryptoLuck Ransomware spread through the RIG-E Exploit Kit

CryptoLuck ransomware is a new strain of malware discovered by the researcher Kafeine, that is being distributed via the RIG-E exploit kit. The notorious researcher Kafeine has spotted a new strain of ransomware dubbed CryptoLuck. The malware leverages DLL hijacking and exploits the legitimate GoogleUpdate.exe executable to infect computers. The ransomware appends the .[victim_id]_luck extension to the encrypted […]

Pierluigi Paganini November 16, 2016
PoisonTap hacking tool can compromise any password-protected PC

Samy Kamkar has created a new hacking tool, dubbed PoisonTap, to easily hack into a password-protected computer. PoisonTap is a new hacking tool that could be used by attackers to easily access to a password-protected computer, hijack all its Internet traffic, and also install backdoors. Try to imagine who is the hacker behind this new tool? […]

Pierluigi Paganini November 16, 2016
OurMine hackers hacked Mark Zuckerberg’s online accounts for the second time

For the second time this year, the hacker group OurMine breached one of the online accounts of the Facebook CEO Mark Zuckerberg. For the second time, this year hackers seems to have breached the Facebook CEO Mark Zuckerberg. The notorious hacking group known as OurMine has claimed credit for hacking Mark Zuckerberg’s online accounts. The news […]

Pierluigi Paganini November 16, 2016
CVE-2016-4484 Hold down the Enter key for 70 sec to gain a Linux Root shell

The CVE-2016-4484 vulnerability can be exploited to gain a Linux Root shell by simply pressing the Enter Key for 70 Seconds. It could be quite easy to bypass the authentication procedures on some Linux systems just by holding down the Enter key for around 70 seconds. In this way, it is possible to open a shell […]

Pierluigi Paganini November 16, 2016
Hacker behind Spamhaus attack will not spend any time in the jail

The Dutch hacker Sven Olaf Kamphuis who was charged for Spamhaus attack, a massive DDoS attack, will not spend any time in the jail. The Dutch hacker Sven Olaf Kamphuis who was charged for the massive DDoS attack against the  anti-spam group Spamhaus, the biggest attack of ever, escaped prison Monday. The Spamhaus Project is an international nonprofit […]

Pierluigi Paganini November 15, 2016
Experts spotted a secret backdoor in Android phones that sends data to China

Experts at Kryptowire discovered a mobile phone firmware that transmitted personally identifiable information without user consent due to a backdoor. Security experts from Kryptowire firm have discovered a backdoor in the firmware installed on low-cost Android phones. The backdoor affects mobile phones from BLU Products that are available for sale on both Amazon and Best Buy. […]

Pierluigi Paganini November 15, 2016
Ransomware: How to recover your encrypted files, the last guide.

In this guide, we will explain how to recover encrypted files focusing on the Data-Locker Ransomware that targets the Windows operating system. Why my system asks me to pay? A ransomware is a computer malware that limits the access of a system and ask for a ransom in order to remove that restriction. The restriction […]