Breaking News

Pierluigi Paganini August 08, 2016
Hackers could break into billion computers through their monitor

At the DEF CON conference, a group of three researchers from Red Balloon Security has demonstrated how to hack a computer through its monitor. It is a common error consider monitors as a passive device that could not be exploited by attackers to hack our systems. The reality is quite different, attackers could hijack every monitor […]

Pierluigi Paganini August 08, 2016
A New Google API Launched, in Avoidance of Android Passwords

Google has launched a new Google API working together with Dashlane, to stop using passwords for Android users and improving the user experience. It is true that Android security apps work wonder and also Google has been trying to use fewer passwords or none whatsoever, making it harder for someone to penetrate the privacy of its users. […]

Pierluigi Paganini August 07, 2016
A flaw in Samsung Pay could be exploited to remotely skim credit cards

The security expert Salvador Mendoza demonstrated that is it easy to steal Samsung Pay tokens and reuse them to make fraudulent purchases. The security researcher Salvador Mendoza has discovered a flaw in the Samsung Pay system that could be exploited by hackers to remotely skim credit cards. The attackers can steal Samsung Pay tokens and […]

Pierluigi Paganini August 07, 2016
Security Affairs newsletter Round 72 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all let inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html THANK YOU! Danger Drone, the flying hacking machine devised by a cyber security duo A close look at […]

Pierluigi Paganini August 07, 2016
Hacker Interviews – CtrlSec

Are you searching for a hacker that attacks ISIS online propaganda every day? CtrlSec is the right person. Enjoy the interview! Did you participate in several hacking campaigns? could you tell me more about you? I actually just had some experience with web design, I decided to start doing something with ISIS when me and a group of other people […]

Pierluigi Paganini August 07, 2016
Car thefts – Two men used a pirated software running on a Laptop to steal more than 100 cars

Huston police identified and arrested 2 men while it was investigating a series of car thefts made using a pirated software running on the thieves’ laptop Two men have stolen more than 100 vehicles by using a laptop running a common software that’s used by technicians and auto dealers. The two criminals, Michael Arce, 24, and […]

Pierluigi Paganini August 06, 2016
Cyberwar – The cyberspace is already a dangerous battlefield

The number of high-profile hacks demonstrates that a silent cyberwar is already ongoing among countries in the cyberspace. The recent hacks of the Democratic National Committee and presidential candidate Hillary Clinton’s campaign and the alleged infections spotted by the Russian FSB inside government networks demonstrate the intense activity in the cyberspace. It is a virtual […]

Pierluigi Paganini August 06, 2016
Kasidet PoS malware bypasses Account Control posing as Microsoft App

Experts from Dr Web discovered a new PoS malware dubbed Kasidet that can bypass User Account Control (UAC) by posing as a legitimate Microsoft application. A new strain of PoS malware is in the wild, experts from security firm Doctor Web  named it Trojan.Kasidet.1 and it is able to bypass defense mechanism such as the Microsoft […]

Pierluigi Paganini August 06, 2016
FireEye Report – 33 percent of ICS Flaws had no vendor fixes when reported

FireEye documented more than 1,500 vulnerabilities affecting ICS disclosed in the past 15 years, and some of them are still present. Security of critical infrastructure is a pillar of the cyber strategy of any government, both the NIS directive and Warsaw NATO summit stressed the importance of a proper security posture to protect our systems from cyber […]

Pierluigi Paganini August 05, 2016
How to withdraw up to $50,000 in cash from an ATM by using data stolen from EMV cards

Researchers have demonstrated how crooks can make ATMs spit out thousands of dollars in cash in just a few minutes by using data stolen from EMV cards. When the EMV (Europay, MasterCard, and Visa) was introduced, the vast majority of security experts believed solved the problems caused by easy to clone magnetic stripe cards. EMV chip-equipped […]