Breaking News

Pierluigi Paganini May 26, 2016
Cheap DDoS for Hire services discovered on a Freelancer-finding site

Incapsula experts Igal Zeifman and Dan Breslaw unmasked the availability of stresser and booter DDoS services on Fiverr website at very affordable prices. The Freelancer-finding site Fiverr is offering DDoS attacks-as-a-service for just five dollars. The site connects professionals that offer any kind of services to buyers. If you are searching for a developer to hire, […]

Pierluigi Paganini May 26, 2016
Creators of the Nuclear EK are gaining nearly 100K USD each month

According to security experts at Check Point the creators of the Nuclear EK are gaining nearly 100K USD each month, most victims are in Europe and US. Most people interested working with a cloud business model nowadays, even malware programmers. It is better than just one time selling a security exploit, authors of malware are […]

Pierluigi Paganini May 26, 2016
Next-gen Tor is arriving and it will include a distributed random number generator

The researchers at the Tor project are working on a new distributed random number generator that will be included in the next-generation Tor. The researchers at the Tor project have elaborated a new way to generate random numbers to support security improvements of its next-generation onion router. The Random Number Generators are essential components for […]

Pierluigi Paganini May 25, 2016
Hacker Interviews – Speaking with Samy Kamkar

Today I want to share you my interview with one of the greatest white hat hackers in the IT Security Industry, the ingenious Samy Kamkar. Samy Kamkar (@SamyKamkar) is one of the most prolific experts that periodically presents new astonishing creations to the IT security industry. Most of you will remember for sure MagSpoof, Combo Breaker, SkyJack, OwnStar, OpenSesame, […]

Pierluigi Paganini May 25, 2016
LinkedIn breach from 2012 still haunting the security community

A data breach suffered by LinkedIn back in 2012 is still haunting the security community. In 2012, LinkedIn suffered an attack heard around the professional world.  The social networking site that caters to professionals and their social peer groups suffered and breach of nearly 6.5 million users.  The attack was attributed to Russian hackers who […]

Pierluigi Paganini May 25, 2016
DMA Locker Ransomware has been significantly improved

Malware authors behind the DMA Locker ransomware have improved the threat is a significant way, now it is ready for a massive distribution. Ransomware represents one of the most worrying cyber threats in the wild, vxers continue to improve their code making hard for victims to defend their systems. Now experts from Malwarebytes researchers are warning […]

Pierluigi Paganini May 25, 2016
Pastejacking attack relies on your clipboard as an attack vector

The Pastejacking Attack exploits JavaScript to override the clipboard content and trick victims into running malicious code. The security expert Dylan Ayrey has devised a new attack technique dubbed Pastejacking attack that leverages on the victim’s clipboard. The possibility of manipulating clipboard without a victim noticing it a known for a long time, it is possible to do […]

Pierluigi Paganini May 25, 2016
Android will replace passwords with trust scores by 2017

Daniel Kaufman announced that Google is planning to make password identifications outmoded by 2017 and replace them with trust scores. Google wants to replace traditional passwords on Android with “trust scores,”  and it is planning to do it by 2017. The announcement was officialized at the Google I/O conference, the IT giant intends to use Google’s Trust API technology developed by […]

Pierluigi Paganini May 24, 2016
What is a SOC (Security Operations Center)?

What is a SOC? What is its mission? Which are the Security tools and technology components of a SOC? Here come all the answers. A definition What is a SOC? A Security Operations Center (SOC) is an organized and highly skilled team whose mission is to continuously monitor and improve an organization’s security posture while […]

Pierluigi Paganini May 24, 2016
FBI warns of KeySweeper keystroke loggers disguised as USB phone chargers

The FBI issued a notification warning actors in the private sector about a rapid diffusion of KeySweeper, a keystroke loggers disguised as USB phone chargers. The FBI is warning actors in the private sector about a rapid diffusion of stealthy keystroke loggers disguised as USB phone chargers. The FBI issued a Private Industry Notification warning of the […]