Breaking News

Pierluigi Paganini May 25, 2016
Pastejacking attack relies on your clipboard as an attack vector

The Pastejacking Attack exploits JavaScript to override the clipboard content and trick victims into running malicious code. The security expert Dylan Ayrey has devised a new attack technique dubbed Pastejacking attack that leverages on the victim’s clipboard. The possibility of manipulating clipboard without a victim noticing it a known for a long time, it is possible to do […]

Pierluigi Paganini May 25, 2016
Android will replace passwords with trust scores by 2017

Daniel Kaufman announced that Google is planning to make password identifications outmoded by 2017 and replace them with trust scores. Google wants to replace traditional passwords on Android with “trust scores,”  and it is planning to do it by 2017. The announcement was officialized at the Google I/O conference, the IT giant intends to use Google’s Trust API technology developed by […]

Pierluigi Paganini May 24, 2016
What is a SOC (Security Operations Center)?

What is a SOC? What is its mission? Which are the Security tools and technology components of a SOC? Here come all the answers. A definition What is a SOC? A Security Operations Center (SOC) is an organized and highly skilled team whose mission is to continuously monitor and improve an organization’s security posture while […]

Pierluigi Paganini May 24, 2016
FBI warns of KeySweeper keystroke loggers disguised as USB phone chargers

The FBI issued a notification warning actors in the private sector about a rapid diffusion of KeySweeper, a keystroke loggers disguised as USB phone chargers. The FBI is warning actors in the private sector about a rapid diffusion of stealthy keystroke loggers disguised as USB phone chargers. The FBI issued a Private Industry Notification warning of the […]

Pierluigi Paganini May 24, 2016
Operation Ke3chang, alleged Chinese hackers target Indian Embassies Worldwide

Security experts from PaloAlto Networks collected evidence that the Operation Ke3chang discovered by FireEye in 2013 is still ongoing. Back in 2013, the security researchers at FireEye spotted a group of China-Linked hackers that conducted an espionage campaign on foreign affairs ministries in Europe. The campaign was named ‘Operation Ke3chang,’ now threat actors behind the […]

Pierluigi Paganini May 23, 2016
Magnitude EK authors are integrating exploit code for CVE-2016-4117 Adobe flaw

The authors of the Magnitude exploit kit are integrating the exploit code for the CVE-2016-411 Adobe Flash Player vulnerability. Recently security experts from FireEye detailed the exploit chain for the  Adobe Flaw Vulnerability CVE-2016-4117 that was first spotted by the company earlier May. The CVE-2016-4117 flaw affects older versions of the Adobe Flash, after the disclosure of […]

Pierluigi Paganini May 23, 2016
Criminals steal $13m in three hours from ATMs across Japan

Japanese police are investigating coordinated raids across stores in Japan that resulted in the theft of $13m from ATMs in just three hours. Cybercrime doesn’t know boundaries, and in many countries, security experts are observing a rapid evolution of illegal phenomena on the web. The Japan actually hosts one of the most interesting underground communities, a criminal online […]

Pierluigi Paganini May 23, 2016
Slovenian hacker who reported issues in Tetra Protocol gets prison sentence

A Slovenian student who reported configuration errors in the Tetra protocol used by the local Police gets a prison sentence. Ethical hacking could be very risky, this is the experience of a 26-year-old Slovenian student, Dejan Ornig, that had serious problems after the discovery of flaws in the Police Communications Protocol. It is incredible, but authorities […]

Pierluigi Paganini May 22, 2016
Journalists get scammed trying to buy an AK47 in the Dark Web

Producers from the German broadcaster ARD have conducted an interesting experiment to demonstrate how to buy a weapon on the dark web. When journalists write about the black markets hosted on the dark web always describe these places as crucial aggregators where it is possible to buy any kind of illegal product and service. A keyboard, […]

Pierluigi Paganini May 22, 2016
Microsoft warns of malicious macros using a new sneaky trick

Researchers at the Microsoft’s Malware Protection Center are warning of a new wave of attacks leveraging malicious macros using a new sneaky trick. Researchers at Microsoft’s Malware Protection Center are warning of a new technique attackers are using to allow macro malware elude detection solutions. The experts first spotted the technique while analyzing a file […]