Breaking News

Pierluigi Paganini November 22, 2015
Shedun adware can install any malicious mobile app by exploiting Android Accessibility Service

Shedun Trojanized adware family implements the ability to automatically install any app on the devices by exploiting the Android Accessibility Service. Android is once again in the storm, threat actors can install any malicious third-party app on mobile devices remotely even if the users explicitly refuse it. Security experts at mobile security firm Lookout have […]

Pierluigi Paganini November 22, 2015
DHS Information Security Program, Dozens secret databases vulnerable to hack

Evaluation of DHS Information Security Program for Fiscal Year 2015 revealed the existence of dozens of top-secret unpatched databases. The story I’m about to tell you is staggering, the US Department of Homeland Security is running dozens of unpatched and vulnerable databases, a number of them contained information rated as “secret” and even “top secret.” The discovery emerged […]

Pierluigi Paganini November 21, 2015
The new Nmap 7 version just released

After 3.5 years, Fyodor has released the new version of the popular open-source network-exploration tool Nmap 7. After 3.5 years, Fyodor has released the new version of the popular network-exploration tool Nmap 7. Nmap is one of the most popular open-source network mapper, the principal changes announced for this release are: – 3,200 code commits since Nmap […]

Pierluigi Paganini November 21, 2015
Anonymous Took Down 20,000 pro-ISIS Twitter accounts

In the wake of Paris attacks Anonymous continues its campaign against the ISIS and announced to have taken down 20,000 pro-ISIS Twitter accounts. In the wake of Paris attacks the hacking collective Anonymous launched its offensive against the ISIS with the intent to interfere with the online propaganda and reveal the identity of its members. The #OpParis follows […]

Pierluigi Paganini November 21, 2015
Zerodium price list for secret Hacking methods

The Zerodium (Zero-day broker) company has published a price list for various classes of software targets and digital intrusion methods. In an exceptional move on 18th of Nov (Wednesday), the Zerodium (Zero-day broker) published a price list for various classes of software targets and digital intrusion methods that is purchased from cyber criminals and resells to consumers […]

Pierluigi Paganini November 21, 2015
SilverPush technology tracks user habits with near-ultrasonic sounds

The SilverPush technology allows advertising firm to track user habits with near-ultrasonic sounds.How does it work? A few days ago, the Center for Democracy and Technology (CDT) warned that the Indian company SilverPush has developed a technology that allows adverts to ping inaudible commands to mobile devices. SilverPush has issued also an SDK that could […]

Pierluigi Paganini November 20, 2015
The ISIS guide, how to stay secure online

Which are the technological tools used by the ISIS? Do the terrorists know how to avoid the surveillance online? The ISIS guide has the replies to these questions. In the wake of Paris attacks, intelligence agencies and law enforcement have raised again the debate about the encryption requesting IT giants to support them by introducing backdoors in their products. But […]

Pierluigi Paganini November 20, 2015
Nested backdoor affects 600,000 Arris cable modems

A Brazilian security researcher has discovered a nested backdoor affecting nearly 600,000 Arris cable modems. Arris is working to fix it. The Security expert Bernardo Rodrigues (@bernardomr) has discovered the presence of a “backdoor-within-a-backdoor” in roughly 600,000 Arris cable modems. Rodrigues is a vulnerability tester at Brazil’s Globo television network, he reported the undocumented library in […]

Pierluigi Paganini November 20, 2015
EU plans to ban Bitcoin to curb terrorism funding

According to a draft document seen by the Reuters the EU plans to ban bitcoin and any form of anonymous payment online to curb terrorism funding. European Union countries are planning to ban virtual currencies and any form of anonymous payments online, even through pre-paid cards. According to a draft document seen by journalists at […]

Pierluigi Paganini November 20, 2015
Hackers behind Dark Seoul are back

The hacking group that behind the Dark Seoul Operation that hit entities in South Korea in 2013 may be back with new targets. According to the experts at Palo Alto Networks, the hacking group behind the attacks that targeted banks, financial institutions, government websites and news agencies in South Korea is still active. The attacks […]