Breaking News

Pierluigi Paganini March 09, 2016
More than a billion Android devices are easy to hack

A large percentage of Android devices is affected by security vulnerabilities that could be exploited by attackers to easily gain a Root Access. According to experts at TrendMicro a large percentage of Android devices in use today is affected by security vulnerabilities that could be exploited by attackers to easily gain a root access. The attack allows an ill-intentioned […]

Pierluigi Paganini March 09, 2016
How to exploit TFTP protocol to launch powerful DDoS amplification attacks

A group of security researchers from the Edinburgh Napier University elaborated a new DDoS amplification technique relying on the TFTP protocol. A group of security experts from the Edinburgh Napier University (Boris Sieklik, Richard Macfarlane and Prof. William Buchanan) have discovered a new vector for DDoS amplification attacks. Recently the security community has discovered several ways […]

Pierluigi Paganini March 09, 2016
Let’s Encrypt has already issued one Million certificates

The Electronic Frontier Foundation announced that the Let’s Encrypt Certificate Authority issued its millionth certificate. The open Certificate Authority (CA) Let’s Encrypt seems to be a success, the EFF is reaching its goals with the creation of this new certificate authority run by Internet Security Research Group (ISRG). IT giants like Mozilla, Cisco, Akamai, Automattic and […]

Pierluigi Paganini March 09, 2016
Brazilian underground is the first in spreading cross-platform malware

Coder in the Brazilian Cyber Criminal underground are Pioneering Cross-platform malware relying on Java archive (JAR) Files. Recently security experts at PaloAlto Networks uncovered a new family of ransomware dubbed KeRanger that targets Mac OS X users, a circumstance that demonstrates that every OS is potentially at risk. Now researchers at Kaspersky Lab have discovered new families […]

Pierluigi Paganini March 08, 2016
South Korea accused North Korea of hacking key officials’ mobile

The South Korean NIS revealed that North Korea had hacked into smartphones belonging to a number of key government officials. The South Korean National Intelligence Service (NIS) revealed that North Korea had hacked into smartphones belonging to a number of key government officials. The announcement was made on Tuesday, according to the NIS cyber spies from  North […]

Pierluigi Paganini March 08, 2016
International politics of the VPN regulation

How VPN (virtual private networks) are being utilized for stimulation, legislative issues, and correspondence in various nations. As information security guru Bruce Schneier and his Berkman Center for Internet and Society associates brought up in a report a week ago, there are currently around 865 encryption-related items accessible all around the globe. From voice encryption […]

Pierluigi Paganini March 08, 2016
How to bypass Apple Passcode in 9.1 and later

A number of bypass vulnerabilities still affect iOS devices and could be exploited by an attacker to bypass the passcode authorization screen. A number of bypass vulnerabilities still affect iOS devices and could be exploited by an attacker to bypass the passcode authorization screen on Apple mobile devices (iPhones and iPads) running iOS 9.0, 9.1, and […]

Pierluigi Paganini March 07, 2016
Expert discovered how to hack any Facebook account

A security researcher has discovered a Facebook password reset vulnerability that allowed him to brute force into any FB account. The security researcher Anand Prakash has discovered a password reset vulnerability affecting Facebook. The critical vulnerability could be exploited by attackers to hack into any FB account launching a brute force attack. “This post is about a simple vulnerability […]

Pierluigi Paganini March 07, 2016
Coping a 3D Model by recording the sounds of a 3D Printer with a smartphone

The sounds of a 3D printer at work can be analyzed by researchers to reconstruct the original 3D model used to create the object. It isn’t a sci-fi movie but a true experiment conducted by the researchers at the University of California Irvine, led by Mohammad Al Faruque, that demonstrated how to steal 3D-Printed models by copying sounds of […]

Pierluigi Paganini March 07, 2016
All current and past Seagate employees victims of W-2 phishing

w-2-phishing – Scammers tricked an employee at data storage firm Seagate Technology into giving away W-2 tax documents on all current and past employees. According to a new sensation case revealed by the popular security expert Brian Krebs, cyber criminals last week tricked an employee at data storage company Seagate Technology into giving away W-2 tax documents on all current and […]