Breaking News

Pierluigi Paganini March 05, 2016
New exploit steals secret cryptographic keys from mobile devices

A group of security researchers has devised a new attack scheme to steal cryptographic keys from both Android and iOS devices. A team of security researchers from Tel Aviv University, Technion and The University of Adelaide has elaborated a new attack scheme to steal cryptographic keys from both Android and iOS devices. Last month, the same team […]

Pierluigi Paganini March 04, 2016
Real pirates used hacking techniques to raid a shipping company

Real pirates have hacked into a shipping company to locate valuable cargo before hijacking vessels in targeted attacks. Technology meets Piracy. The technology is enlarging our surface of attack in a dramatic way, every company in every industry is potentially a target. Let’s discuss today of a singular case that demonstrates it, pirates have hacked into […]

Pierluigi Paganini March 04, 2016
A day attack with DDoS booter cost $60 and can cause $720k in damage

According to a study conducted by the experts at Arbor’s ASERT Team a day attack with a DDoS booter cost $60 and can cause $720k in damage. We have discussed several times about the concept of cybercrime-as-a-service, today I’ll show you a case related the offer for rent of distributed-denial-of-service (DDoS) attacks for less than US$60 per day. […]

Pierluigi Paganini March 04, 2016
Take note, next week update Adobe Reader and Acrobat to fix critical flaws

Adobe announced that it will release security updates next week to patch vulnerabilities in Acrobat and Reader products for Windows and Mac. Adobe has announced yesterday, March 8, that it will release security updates next week to patch vulnerabilities in Acrobat and Reader products for Windows and Mac. We are speaking about critical vulnerabilities that fortunately are currently […]

Pierluigi Paganini March 04, 2016
Which are most used passwords in opportunistic criminal attacks?

Which are the usernames and passwords used by hackers when they scan the internet indiscriminately? Give a look to the Rapid7′ report Recently the firm Splashdata revealed in its annual report on the worst 2015 passwords (“123456” and “password”), today I desire to present you a new interesting study on passwords conducted by Rapid7. The experts used Heisenberg, […]

Pierluigi Paganini March 03, 2016
US starts cyber operations against the ISIL in Mosul

Senior Pentagon officials on Monday revealed the military’s first use of cyber warfare operations against the ISIL terrorist group. The US military has started launching cyber attacks against members of the terrorist organization ISIS as part of the operation conducted to take back the Iraqi city of Mosul. The US military is using cyber tools to […]

Pierluigi Paganini March 03, 2016
$17 smartwatch includes a backdoor in the pairing app

A group of researchers that analyzed security of a number of smart watches discovered a $17 smartwatch is sold with a backdoor in the pairing app. Be careful of cheap smartwatch offered on the web, security researchers at Mobile Iron have found that the U8 Smartwatch available on eBay for sale is offered with an Android or iOS app […]

Pierluigi Paganini March 03, 2016
RSA Conference Badge Scanning App has a default password hardcoded

Researchers at Bluebox Security discovered that the badge scanning application used at the RSA Conference 2016 includes a hardcoded default password. This year participants at the 2016 RSA Conference will have an ugly surprise, many vendors were provided with Samsung Galaxy S4 smartphones that run a special Android app, available on the Google Play, that allows them to […]

Pierluigi Paganini March 03, 2016
French Gov could fine Apple and Google €1m unless they hack mobile devices

French Gov is thinking a law that would impose fines of €1 million on Apple and Google if they refused providing access users’data. Governments worldwide continue to intensify their pressure on the IT giants requesting the access to users’ data in the name of security. The US Government wants Apple unlock its mobile devices to access data, the […]

Pierluigi Paganini March 02, 2016
US DoD invites a restricted number of hackers to Hack the Pentagon

Hack the Pentagon – DoD would invite outside hackers to test the cybersecurity of some public US Defense Department resources as part of a pilot initiative. Which is the best way to discover security vulnerabilities affecting a computer system? Ask a group of hackers to test it. This is the concept behind a bounty program, […]