Breaking News

Pierluigi Paganini April 25, 2016
Faster Internet Adware silently takes screenshot of your PC

Security Experts at Bleeping Computer have discovered a new adware dubbed Faster Internet that takes a screenshot of victims’ computers. Security Experts at Bleeping Computer have spotted a new strain of adware, known as Faster Internet, that takes a screenshot of victims’ PCs. Lawrence Abrams, a computer security expert at Bleeping Computer, explained in a blog post […]

Pierluigi Paganini April 25, 2016
Bogus social button plugin redirects to Angler Exploit Kit

Experts at Malwarebytes observed a new attack pattern that relies on fake social button plugin that redirects visitors to Angler Exploit Kit. Cyber criminals continue to use compromised websites to serve malware or to redirect visitors to domains hosting exploit kits. Experts at Malwarebytes observed a new attack pattern that relies on a domain name to lure […]

Pierluigi Paganini April 25, 2016
The US Cyber Command started the attacks on the Islamic State

The US Government has announced to have launched a series of cyber attacks against the Islamic State coordinated by the Cyber Command. The US Government has launched its cyber offensive against the coordinated by the Cyber Command. The strategy is clear, the use of hacking operations and cyber weapons will aim to destroy computer systems […]

Pierluigi Paganini April 25, 2016
DARPA calls for a hacker-proof encryption App, and it will pay it

The Defense Advanced Research Projects Agency is calling for the development of a hacker-proof encryption App for the U.S. military. The US Defense Advanced Research Projects Agency (DARPA) is calling security experts to create a hacker-proof “messaging and transaction platform.” The project for a hacker-proof encryption App was proposed under the rules of the Small Business Technology Transfer […]

Pierluigi Paganini April 24, 2016
Dutch police seize the Ennetcom encrypted communication network

The Dutch police in an international effort with Canadian authorities seized the Ennetcom encrypted communication network used by 19,000 users. Another success of the Dutch law enforcement against the cybercrime. The police arrested the owner of Ennetcom, a provider of encrypted communications with more than 19,000 customers. Prosecutors suspect he was using the business to manage […]

Pierluigi Paganini April 24, 2016
Security Affairs newsletter Round 57 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs American company lost $100 million to BEC fraud Europol and Italian Carabinieri an international ATM Skimming network Lottery security director hacked random-number generator to rig lotteries Security Affairs newsletter Round 56 – News of the week Experts […]

Pierluigi Paganini April 24, 2016
Snap packaging could reveal private data in Ubuntu 16.04 version

A feature in the Ubuntu 16.04 version could be abused to expose users private data posing a serious threat to their privacy and security. A feature in the last version of Ubuntu, the Ubuntu 16.04 version, could inadvertently expose users private data posing a serious threat to their privacy. According to the open-source software expert […]

Pierluigi Paganini April 24, 2016
Bangladesh Bank hacked due to inadequate defense systems

Investigators discovered that the hackers managed to gain access to the Bangladesh Bank network because it was using second-hand switches and no firewall. In  March, unknown hackers have stolen more than $100 million from the Bangladesh Bank account at the US Federal Reserve Bank. Now new disconcerting news regarding the Bangladesh bank is in the headlines. According […]

Pierluigi Paganini April 23, 2016
Facebook passes the 1 million Tor users Milestone

Facebook announced that the number of its users accessing through the Tor network has passed 1 million. The number is calculated over a period of 30 days. Facebook has announced Friday that it has passed 1 million Tor users. As announced in a blog post, the number is calculated over a period of 30 days. “Over […]

Pierluigi Paganini April 23, 2016
Software Reverse Engineering Process: Basics and Some Explanations

Software reverse engineering is frequently mentioned in several contexts, including many illegal activities. What does it mean? Software reverse engineering is frequently mentioned in the context of illegal activity: the stealing of IP, fraud with software licenses, and so forth. At the same time, reversing has legal applications, the most known of which is malware research. […]