Breaking News

Pierluigi Paganini July 28, 2015
Darkode black market back online with security improvements

The administrator of the popular Darkode hacking forum announced that the platform will back online soon with new security improvements. A few days ago Darkode, a black market specialized in the sale of exploit kits and hacking tool was shut down by an international operation of law enforcement. A joint operation run by the FBI and other […]

Pierluigi Paganini July 28, 2015
Just a basic low-end mobile phone needed to hack Air-Gapped computer

Security researchers from Israel proved that hacking most secure Air-gapped computers that typically are used in sensitive work environments, is possible just via a low end basic phone. Mostly nuclear power plants and other sensitive work environments that tend to have strict security, go with making use of the air-gapped computers and preventing their workers […]

Pierluigi Paganini July 27, 2015
Stagefright, just a message to hack 950 Million Android devices

Android users are threatened by a new vulnerability dubbed Stagefright in the popular Google mobile OS, which allows hackers to gain control of the system without raising suspicion.  Another disconcerting aspect of the Stagefright flaw is that it potentially affects 95% of Android devices running version 2.2 to 5.1 of the Google OS (roughly 950 million smartphones […]

Pierluigi Paganini July 27, 2015
Advertising hijacking made by Invisible rogue mobile apps are wasting petabytes of data a day

Mobile Malware is growing and crooks are targeting the advertising industry to redirect users to ad pages in a sort of Advertising hijacking. Mobile Malware is growing and crooks are targeting the advertising industry with malicious codes able to redirect users to ad pages, this practice is known as Advertising hijacking. These “rogue mobile apps” […]

Pierluigi Paganini July 27, 2015
FireEye report on TTPs of Nigerian a 419 scammers group

FireEye published a report on the operations of a group of 419 scammers located in Nigeria, which is using malware as a component of their fraud scams. Security firm FireEye has published a new report on a new group of 419 scammers that is using keyloggers and other malware to implement its fraud scheme. According to the investigators, the fraudsters diverted potentially millions […]

Pierluigi Paganini July 27, 2015
Drone Firing Semi-Automatic Handgun, what’s next?

While a video of a drone firing a semi-automatic handgun is circulating on the internet, security experts demand a strict law in the use of UAVs. I decided to present you this case to raise once again, my concerns on the uncontrolled and the unregulated diffusion of drones. Unmanned aerial vehicles (UAVs) are a powerful instrument […]

Pierluigi Paganini July 26, 2015
Security Affairs newsletter Round 19 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Russian APT launched a new phishing campaign on the Pentagon Dead NIS agent left note denying spying on SK population Microsoft to spoofed Skype users: Change your account passwords […]

Pierluigi Paganini July 26, 2015
Anonymous’s team GhostSec thwarts Isis terror plots

Anonymous affiliate GhostSec has supported US law enforcement and Intelligence agencies in thwarting Isis terror plots in New York and Tunisia. The popular Anonymous affiliate GhostSec has provided useful information on preventing terrorist attacks on New York and Tunisia planned by the Islamic State (Isis), according to a counterterrorism expert. According to the Internation Business Times, Michael Smith, an adviser to […]

Pierluigi Paganini July 26, 2015
HORNET, the High-Speed Tor-Like encrypted anonymous network

A group of six academics has developed Hornet, a new high-speed anonymity network that promises to be a valid alternative to the popular Tor network. Hornet allows for anonymous web surfing protecting the user’s privacy. The principal advantage HORNET has respect other anonymizing networks like Tor, is the speed. The Hornet is able to manage anonymous traffic […]

Pierluigi Paganini July 25, 2015
Chrysler Recalls 1.4 Million Vehicles After Jeep Cherokee PoC Hack

Fiat Chrysler has recalled 1.4 million vehicles following security researchers hacked a Jeep Cherokee remotely by exploiting a vulnerability in its systems. One of the arguments most debated in the hacking and security community this week is the recent hack of a Fiat Chrysler Jeep. The security experts Chris Valasek and Charlie Miller have demonstrated […]