Breaking News

Pierluigi Paganini October 02, 2015
Experian’s data breach puts 15 million T-Mobile users at risk

Experian’s data breach puts 15 million T-Mobile users’ personal information at risk- The company already started the incident response procedure. T-Mobile has announced that data belonging to 15 million consumers may have compromised in a cyber attack that the company has suffered. The hackers targeted the Experian company which processes some of T-Mobile’s credit applications accessing customers personal data. “We have been notified […]

Pierluigi Paganini October 02, 2015
A billion Android devices vulnerable to Stagefright 2.0 bugs

A billion Android phones are vulnerable to Stagefright 2.0 flaws that could be exploited by attackers to execute malicious code on the targeted device. Do you remember the Stagefright vulnerability? In July 2015,  security experts from Zimperium discovered the Stagefright flaw in the popular Google Android OS which allows hackers to gain control of the system without raising […]

Pierluigi Paganini October 02, 2015
Cyberspace Global Warming as a duality of Trajectories on cyberpolitics

The permanent movement of trajectories on cyberpolitics is transforming political discourse. Last 29th of September, cybernauts worldwide received a simple twitter from Edward Snowden titled “Can you hear me now?”. It was a cyber experiment with a total of 170 000 followers, by shared 25000 times during an hour. This simple demonstration on cyberpolitics may […]

Pierluigi Paganini October 02, 2015
The Dridex Banking Malware is risen, British attention

The Dridex Banking Malware is risen, security experts at Palo Alto intelligence discovered a still ongoing large phishing campaign. Once against the Dridex banking Trojan is in the headlines, this week security experts at Palo Alto intelligence discovered a still ongoing large phishing campaign. The phishing campaign is targeting victims mainly in the UK, the malicious messages […]

Pierluigi Paganini October 02, 2015
The mystery behind the Internet-of-Things vigilante malware

A new strain of malware identified by Symantec as the Vigilante malware, aka Wifatch, has infected tens of thousands of IoT devices across the world. Who is infecting thousands of IoT devices across the world, and why? A new strain of malware, identified by Symantec as Linux.Wifatch has infected tens of thousands of IoT devices across the […]

Pierluigi Paganini October 01, 2015
An Amazon employee became owner of Google.com for a few minutes

Sanmay Ved was searching for available .com domains and discovered the availability of Google.com … then he bought it, but something happened … This story is amazing and difficult to believe …. an individual managed to buy the Google.com domain and now I’ll tell you how. The guy is Sanmay Ved, a former Google employee that currently works for Amazon. […]

Pierluigi Paganini October 01, 2015
New Apple Gatekeeper bypass can allow running rouge applications

Patrick Wardle, director of research at Synack has already demonstrated another method, called Apple dylib hijacking, to bypass Apple GateKeeper. Since the introduction of the Apple Gatekeeper by MAC OSX, many researchers have focused their attention in trying to find flaws affecting it due to bypass Apple security and gain control of a device. Patrick […]

Pierluigi Paganini October 01, 2015
WinRAR zero-day open million users to hack

The security researcher Mohammad Reza Espargham a new zero-day flaw is threatening million of users of the latest version of WinRAR. Yesterday I reported the news of two critical vulnerabilities that affect the popular TrueCryptTrueCrypt application and the related risks for the users, today a new zero-day flaw is threatening million of users of the latest […]

Pierluigi Paganini October 01, 2015
US Air Force Wireless hacking in Flight

The US Air Force is using a modified  EC-130 Compass Call aircraft to demonstrate how to hack into enemy networks. Information warfare is overlapping traditional military domains, in order to conduct a fight in the air it is possible to used new hacking techniques as the US Air Force demonstrated. According to the Maj. Gen. […]

Pierluigi Paganini September 30, 2015
The Hacking crew known as Gaza cybergang was very active in Q2 2015

Security experts at Kaspersky have observed an increase in the activity of the group of hackers politically motivated known as Gaza cybergang. A group of hackers known as “Gaza cybergang” and “Gaza Hackers Team” has been targeting IT and Incident Response Team in the Mena (Middle East North Africa) area. The Gaza cybergang appears to be […]