Breaking News

Pierluigi Paganini December 09, 2015
Cadelle and Chafer, Iranian hackers are tracking dissidents and activists

Symantec has uncovered Cadelle and Chafer groups, two Iran-based hacking teams that are tracking dissidents and activists. According to a new report published by Symantec. Iranian hackers have been using malware to track individuals, including Iranian activists and dissidents. The researchers have identified two groups of Iran-based hackers, dubbed Cadelle and Chafer, which were distributing data stealer malware […]

Pierluigi Paganini December 08, 2015
Hashcat, the fastest Password Cracking utility is now Open Source

Hashcat, the popular password recovery tool has been released as open source under the MIT license. You can contribute to it. The popular password cracking tool Hashcat is not an open source software, the announcement was first made on December 4 on Twitter via an MD5 hash that posted  the following message: “hashcat open source” @hashcat […]

Pierluigi Paganini December 08, 2015
Linksys wireless routers are open to cyber attacks

According to an advisory published by the KoreLogic firm the Linksys EA6100-6300 wireless routers are vulnerable to attacks due to flawed CGI scripts. Once again IoT devices are in the headlines, once again SOHO routers are affected by a security vulnerability that opens users to cyber attacks. According to the KoreLogic firm, the flawed devices […]

Pierluigi Paganini December 08, 2015
Nemesis, a bootkit used to steal payment card data

Nemesis is a new strain of malware, very hard to detect and remove, designed to steal payment card data and implementing bootkit functionalities. Experts at FireEye have discovered a new strain of malware designed to steal payment card data. Nothing new, you are probably saying, but this malware dubbed Nemesis is very difficult to detect […]

Pierluigi Paganini December 08, 2015
BackStab Malware steals iOS and BlackBerry Backups

Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile data backups. Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile data backups and transfer it to the C&C server. The malware is not able to […]

Pierluigi Paganini December 07, 2015
Security Affairs newsletter Round 38 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Vtech hacked, data of thousands of kids exposed Russia deploys jamming systems in Syria as tensions rise Turris Omnia Security Project protects home network users Microsoft takes PUPs behind […]

Pierluigi Paganini December 07, 2015
Critical vulnerabilities found in Honeywell Midas Gas Detectors

Another vulnerable IoT device is in the headlines, this time two serious vulnerabilities affect the Honeywell Midas gas detectors. Honeywell has just released firmware updates for its Midas gas detectors to fix two high severity vulnerabilities. The Midas gas detectors are a category of product manufactured by Honeywell to detect toxic, ambient and flammable gasses in the […]

Pierluigi Paganini December 07, 2015
The French Gov wants to Block Tor and Forbid Free Wi-Fi

In response to the recent Paris terror attacks, the French government is proposing to forbid and block the use of the Tor anonymity network. In response to the recent Paris terror attacks, the French government is proposing to forbid and block the use of the Tor anonymity network. According to an internal document from the Ministry of […]

Pierluigi Paganini December 07, 2015
ISIS members have developed a mobile app for its communications

Ghost Security Group has reportedly discovered an Android mobile application used by members of the ISIS organization for secure communications. According to the Christian Science Monitor, the Ghost Security Group has reportedly discovered an Android mobile app used by members of the ISIS organization. The Ghost Security Group is the notorious group of cyber experts in counter-terrorism networks that is […]

Pierluigi Paganini December 07, 2015
3 OEMs Vulnerable To 3 Vulnerabilities. Your PCs At Risk

Bad news for PC users, Lenovo machines can be hijacked by visiting a malicious website, meanwhile Dell and Toshiba PC are affected by serious flaws. Security Researcher slipstream/RoL posted Proof-of-concept exploits online (3 OEMs Vulnerable To Three Vulnerability Your PCs At Risk) demonstrating how to compromise machines available on the market. Three OEMs. Three applications preinstalled. Three exploits. […]