Breaking News

Pierluigi Paganini May 09, 2016
2015 intelligence transparency report, the surveillance is still nosey

According to 2015 intelligence transparency report, the searches of US citizens made by the NSA and CIA intelligence agencies have almost doubled since 2013 If you believe that the Snowden‘s revelations have stopped or limited the surveillance activities you are obviously wrong. The diffusion of the technology and the increasing threats of espionage and terrorism is […]

Pierluigi Paganini May 09, 2016
Hackers can break into a facility by spending $700 on Amazon or eBay

Hackers demonstrated to the Tech Insider how to break into any office by purchasing from Amazon and eBay $700 worth of electronic parts to clone access cards. Breaking into a company could be very easy and cheap for hackers, it could be sufficient to buy from Amazon and eBay $700 worth of parts. “We watched a […]

Pierluigi Paganini May 08, 2016
Hacker Interviews – The hacker: zurael sTz

This is the first of a series of  “Hacker Interviews” that will aim to help us get a better understanding of the motivations and techniques of the hackers. The information security industry spends time and effort not only to stop hackers but also to understand and simulate them. Vulnerability assessments and penetration tests are specially […]

Pierluigi Paganini May 08, 2016
Liberty Reserve founder sentenced 20 years in jail

Arthur Budovsky, the co-founder of the online underworld bank Liberty Reserve, was sentenced to 20 years in prison for committing money laundering. Arthur Budovsky, the co-founder of the online underworld bank , was sentenced to 20 years in prison. The man had pleaded guilty to one count of conspiring to commit money laundering. He was condemned […]

Pierluigi Paganini May 08, 2016
Security Affairs newsletter Round 59 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs Pirate Bay visitors infected with Cerber ransomware via bad ads The British GCHQ has disclosed dozens vulnerabilities this year Garage4hackers Webcast – Bypass Modern WAFs Exemplified at XSS Security Affairs newsletter Round 58 – News of the […]

Pierluigi Paganini May 08, 2016
How terrorists abuse online services for propaganda?

Researchers at TrendMicro have analyzed online activities of terrorists identifying the techniques and tools used for their propaganda. Using vulnerabilities in software, websites, and web applications as attack vectors, hosting malicious components in cloud services. Other than this if there’s any service getting launched in the future, there will be always chances of abuse. Experts […]

Pierluigi Paganini May 07, 2016
STUPID LOCKY! Hackers disrupted a Locky ransomware Campaing

Hackers have disrupted a Locky campaign after they compromised one of the cybercriminal servers used by the threat actors. According to the security expert Sven Carlsen from Avira, hackers have dismantled a Locky campaign by hacking the command and control server. Carlsen explained that threat actors behind the Locky campaign spread the threat via spam […]

Pierluigi Paganini May 07, 2016
Journey of a ‘Hacked Computer’ : From Torrents to Botnets

One out of every three websites were involved in transmitting malware to their users, which was found attached to their digital content. Suppose, there is a movie, released last month. You didn’t have the time to watch it in the theatre and you also want to save some money. What would you do? Go to […]

Pierluigi Paganini May 07, 2016
Is the Armageddon a PLC-Based Worm?

Three German security researchers have presented a PLC-based worm with Proof-of-Concept based on the Siemens SIMATIC S7-1200 PLC. Three German security researchers have presented a PLC-based worm at Black Hat Asia. The proof of concept is based on the Siemens SIMATIC S7-1200 PLC which reminds us all two well of an earlier PLC attacking worm […]

Pierluigi Paganini May 07, 2016
Chaos Theory of Standardization in IOT

There are numerous standards being followed currently in the IOT space to connect various devices but no single global framework is followed. As Chaos theory focuses on the initial condition of every event meaning that their future behavior is fully determined by their initial conditions, I feel that the IOT scenario is also currently at […]