Breaking News

Pierluigi Paganini February 29, 2016
Using the Microsoft EMET security tool to hack itself

The security researchers at FireEye Abdulellah Alsaheel and Raghav Pande have found a way to exploit Microsoft EMET (Enhanced Mitigation Experience Toolkit) to hack itself. The security researchers at FireEye security Abdulellah Alsaheel and Raghav Pande have found a way to exploit the Microsoft security tool Enhanced Mitigation Experience Toolkit to hack itself. The Enhanced Mitigation […]

Pierluigi Paganini February 29, 2016
Chinese ISPs are redirecting users legitimate traffic to malicious sites/ads

Chinese ISPs (internet service providers) are redirecting users legitimate traffic to malicious websites serving malware and ads. China is know to be not very “ortodox” when talking about freedom on the internet, over the time, it developed numerous projects to monitor users’ activity. The Great Firewall Now three Israeli researchers uncovered that Chinese ISPs (China Telecom […]

Pierluigi Paganini February 29, 2016
The new FighterPOS PoS Malware implements worm capabilities

The threat actors behind the FighterPOS PoS malware have added worm capabilities to their malicious code that is now targeting systems in the United States. PoS malware represents a serious threat to several industries, from retail to the hotel industry. During the last twelve months, security experts have discovered a significant number of payment card frauds involving […]

Pierluigi Paganini February 29, 2016
A journalist has been hacked on a plane while writing an Apple-FBI story

The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises the discussion on privacy. Experts in the aviation industry are spending a significant effort in the attempt of improving cyber security. The news that I’m going to tell you has something of incredible. The American journalist […]

Pierluigi Paganini February 28, 2016
A DHS report confirms the use of BlackEnergy in the Ukrainian outage, still unknown its role

A report issued by the DHS CERT confirms that the outage in Ukraine was caused by a well-coordinated attack still unclear the BlackEnergy role. In December, a major outage hit a region in Ukraine, more than 225,000 customers were affected by the interruption of the electricity. Security experts speculate the involvement of Russian nation-state actors that have used the BlackEnergy to […]

Pierluigi Paganini February 28, 2016
Security Affairs newsletter Round 49 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs Project Cumulus – Tracking fake phished credentials leaked to Dark Web Linux Mint was hacked, website served malicious ISO on Saturday Utah systems experiences 300k hacking attacks a day due to the presence of the NSA Data […]

Pierluigi Paganini February 28, 2016
German authorities approve the use of home-made Federal Trojan

The German Interior Ministry has approved the use of a federal Trojan developed by the German Federal Criminal Police. The German Interior Ministry has approved the use a spyware developed by the German Federal Criminal Police, aka the ‘federal Trojan’ or Bundestrojaner, for the investigative purpose. “Soon the state could re-enter the computer of suspicious […]

Pierluigi Paganini February 28, 2016
CTB-Locker for Websites is spreading in the wild

The experts at BleepingComputer reported a new strain of CTB-Locker for Websites, a new ransomware that mainly targets WordPress sites. Ransomware continues to threaten users worldwide, today we discussed German Hospitals paralyzed by the malware.  TeslaCrypt, Cryptowall and Locky are the names of the most popular ransomware that already infected millions machines worldwide. The experts at BleepingComputer reported a new […]

Pierluigi Paganini February 27, 2016
Securing Hospitals from hackers that can put lives in dangers

Securing Hospitals is a report issued by Independent Security Evaluators that demonstrates how hackers can hack hospitals putting lives in danger. A group of experts from the Independent Security Evaluators research team have tested the security of hospital networks, demonstrating how it is possible to gain access to critical medical equipment in attacks they say could put lives in danger. […]

Pierluigi Paganini February 27, 2016
Gemalto Breach Level Index report 2015, what are hackers looking for?

2015 Gemalto Breach Level Index report confirmed the increased interest of threat actors in Government and healthcare data. As per the security firm Gemalto, Government and healthcare have overwhelmed the retail area as most-focused for information breaks. An aggregate of 1,673 information ruptures prompted 707 million information records being traded off worldwide amid 2015, as […]