Breaking News

Pierluigi Paganini February 24, 2016
Use of acid and lasers to access data stored on iPhones

While Apple is refusing to support the FBI in the case of San Bernardino shooter Snowden says the FBI can use decapping technique to crack iPhones. Over the last days, there is a huge discussion between Apple and FBI in relation to the access to San Bernardino terrorist Syed Farook’s iPhone. FBI demand to hack […]

Pierluigi Paganini February 24, 2016
Operation Dust Storm, hackers Target Japanese Critical Infrastructure

Japanese commercial and critical infrastructure organizations have been targeted a long-running campaign dubbed Operation Dust Storm. Security firm Cylance have uncovered a long-running hacking campaign dubbed ‘Operation Dust Storm’ targeting commercial and critical infrastructure organizations in Japan. Threat actors behind the Operation Dust Storm have been active since at least 2010, the hackers targeted several organizations in Japan, […]

Pierluigi Paganini February 23, 2016
Anonymous hacked the France’s Ministry of Defense portal CIMD (Centre d’Identification des Materiels de la Defense)

Anonymous hacked the CIMD portal managed by the France’s Ministry of Defense to protest against French foreign arms trade operations. The Anonymous collective has hacked one of the websites managed by the France’s Ministry of Defense, the CIMD (Centre d’Identification des Materiels de la Defense). The hacktivists accessed the database and leaked it online to […]

Pierluigi Paganini February 23, 2016
IRS is warning taxpayers of a new surge in tax-related incidents

It is a nightmare for taxpayers according to an IRS bulletin there is a 400 percent surge in tax-related phishing and malware incidents. This year the IRS already reported 1,026 malware and phishing incidents, compared to 254 this time last year. The IRS is warning taxpayers of newer forms of attacks aiming victims into disclosing […]

Pierluigi Paganini February 23, 2016
Pay-by-Selfie – MasterCard is replacing the customer password with his selfie

MasterCard announced the extension of the ‘pay-by-selfie’ facial recognition technology to 14 countries this summer, this means no more passwords. The giant multinational financial services corporation MasterCard announced the extension of the ‘pay-by-selfie’ facial recognition technology to 14 countries this summer. In October Mastercard announced the creation of a new payment method based on the Identity Check […]

Pierluigi Paganini February 23, 2016
Ratopak Trojan – Russian banks under attack

Financially-motivated actors have targeted employees of at least six Russian banks into installing the Ratopak Trojan, experts have found evidence of an extended hacking campaign. According to the Symantec security firm, a cyber criminal gang financially -motivated has targeted employees of Russian banks. The threat actors have been using a Trojan called Ratopak to gain control over the […]

Pierluigi Paganini February 23, 2016
Russian Nation-state hackers intensify operations in Syria

According to security experts Russian nation-state hackers are behind cyber espionage campaigns against opposition groups and NGOs in Syria. Russia is behind a cyber espionage campaign against Syrian opposition groups and NGOs, the Kremlin wants to conduct a PSYOP to influence the sentiment of the country on the humanitarian crisis as a diversionary action for its military […]

Pierluigi Paganini February 22, 2016
Admedia attacks now rely also on Joomla to serve ransomware

Operators running websites based on the WordPress and Joomla must be aware of a spike in the number of compromised platforms used in Admedia attacks. Not only WordPress CMS, threat actors behind the “Admedia attacks” are now looking with increasing interest to Joomla. This is the discovery made by the experts at the Internet Storm […]

Pierluigi Paganini February 22, 2016
FBI must reveal the network investigative technique used to hack more than 1000 computers

The FBI must provide details on the network investigative technique used to hack more than 1000 computers in a case involving child pornography. In a case involving child pornography, the FBI was ruled by a judge to provide all the code used to hack the PC of suspects and detailed information related to the procedure […]

Pierluigi Paganini February 22, 2016
Source code of the Android GM Bot malware was leaked online

The experts at the IBM X-Force threat intelligence have discovered that the source code for Android malware GM Bot was leaked online. Bad news for the Android community, the experts at IBM X-Force threat intelligence have discovered that the source code for Android malware GM Bot was leaked on an underground. The source code was […]