Breaking News

Pierluigi Paganini October 02, 2015
Cyberspace Global Warming as a duality of Trajectories on cyberpolitics

The permanent movement of trajectories on cyberpolitics is transforming political discourse. Last 29th of September, cybernauts worldwide received a simple twitter from Edward Snowden titled “Can you hear me now?”. It was a cyber experiment with a total of 170 000 followers, by shared 25000 times during an hour. This simple demonstration on cyberpolitics may […]

Pierluigi Paganini October 02, 2015
The Dridex Banking Malware is risen, British attention

The Dridex Banking Malware is risen, security experts at Palo Alto intelligence discovered a still ongoing large phishing campaign. Once against the Dridex banking Trojan is in the headlines, this week security experts at Palo Alto intelligence discovered a still ongoing large phishing campaign. The phishing campaign is targeting victims mainly in the UK, the malicious messages […]

Pierluigi Paganini October 02, 2015
The mystery behind the Internet-of-Things vigilante malware

A new strain of malware identified by Symantec as the Vigilante malware, aka Wifatch, has infected tens of thousands of IoT devices across the world. Who is infecting thousands of IoT devices across the world, and why? A new strain of malware, identified by Symantec as Linux.Wifatch has infected tens of thousands of IoT devices across the […]

Pierluigi Paganini October 01, 2015
An Amazon employee became owner of Google.com for a few minutes

Sanmay Ved was searching for available .com domains and discovered the availability of Google.com … then he bought it, but something happened … This story is amazing and difficult to believe …. an individual managed to buy the Google.com domain and now I’ll tell you how. The guy is Sanmay Ved, a former Google employee that currently works for Amazon. […]

Pierluigi Paganini October 01, 2015
New Apple Gatekeeper bypass can allow running rouge applications

Patrick Wardle, director of research at Synack has already demonstrated another method, called Apple dylib hijacking, to bypass Apple GateKeeper. Since the introduction of the Apple Gatekeeper by MAC OSX, many researchers have focused their attention in trying to find flaws affecting it due to bypass Apple security and gain control of a device. Patrick […]

Pierluigi Paganini October 01, 2015
WinRAR zero-day open million users to hack

The security researcher Mohammad Reza Espargham a new zero-day flaw is threatening million of users of the latest version of WinRAR. Yesterday I reported the news of two critical vulnerabilities that affect the popular TrueCryptTrueCrypt application and the related risks for the users, today a new zero-day flaw is threatening million of users of the latest […]

Pierluigi Paganini October 01, 2015
US Air Force Wireless hacking in Flight

The US Air Force is using a modified  EC-130 Compass Call aircraft to demonstrate how to hack into enemy networks. Information warfare is overlapping traditional military domains, in order to conduct a fight in the air it is possible to used new hacking techniques as the US Air Force demonstrated. According to the Maj. Gen. […]

Pierluigi Paganini September 30, 2015
The Hacking crew known as Gaza cybergang was very active in Q2 2015

Security experts at Kaspersky have observed an increase in the activity of the group of hackers politically motivated known as Gaza cybergang. A group of hackers known as “Gaza cybergang” and “Gaza Hackers Team” has been targeting IT and Incident Response Team in the Mena (Middle East North Africa) area. The Gaza cybergang appears to be […]

Pierluigi Paganini September 30, 2015
Does Mr. Robot’s use real Hacking Tools? Which are?

Check out the hacking tools used by Mr. Robot and see why the display of these tools is as realistic as possible. Mr. Robot has been the breakthrough of summer for series lovers, especially for those who are fans of technology and computing. One of the major advantages of Mr. Robot over other series has […]

Pierluigi Paganini September 30, 2015
Are you still using TrueCrypt? Beware of these 2 critical flaws!

The popular security expert James Forshaw has discovered two critical flaws in the driver that TrueCrypt installs on Windows systems. Bad news for Windows users who have decided to use TrueCrypt to encrypt their hard drives, the researcher James Forshaw, a member of Google’s Project Zero team, has discovered two serious vulnerabilities affecting the popular […]