Breaking News

Pierluigi Paganini August 11, 2015
VBE files on the rise in Brazil leading to Financial Fraud

Security experts at Kaspersky Lab recently observed a big wave of malicious VBE files targeting Brazilian users to distribute Financial Trojan. Recently security experts have seen old tricks rising from the dead (like for example word/excel macros attachment in e-mails) and malicious VBE files are being spread via email targeting Brazilian users. These VBE files […]

Pierluigi Paganini August 11, 2015
Aerial Assault Drone, the new Hacking Weapon presented at the Defcon

A new hacking machine is available in the arsenal of hackers it is an Aerial Assault drone that is able to automatically crack into wireless networks. David Jordan of US-based Aerial Assault presented was the Def Con conference an assault drone equipped with hacking tools. The vehicle could be used in hacking missions, for example by […]

Pierluigi Paganini August 11, 2015
Internal modem can be exploited by malware to gain persistence

Two security experts at the last Def Con hacking conference have demonstrated how Internal LTE/3G modems can be hacked to help malware survive OS reinstalls Many users totally ignore that LTE/3G modems built into new business laptops and tablets have a dedicated processor and operating system that could be exploited by threat actors to maintain persistent […]

Pierluigi Paganini August 10, 2015
IT giants join forces to combat child sexual abuse imagery

Facebook, Google, Twitter, Microsoft and Yahoo and the Internet Watch Foundation (IWF) are joining their efforts in the fight against child sexual abuse. Facebook, Google, Twitter, Microsoft and Yahoo are joining their effort in the fight against child sexual abuse. The IT giants child after joining forces with a the UK charity, the Internet Watch Foundation […]

Pierluigi Paganini August 10, 2015
Certifi-Gate, a new Android flaw allows hackers to control your mobile

Certifi-Gate is the name of a new vulnerability affecting Android mobile devices discovered by Check Point security that could be exploited to control them. Android users had a bad time after discovering the “Stagefright” vulnerability, but unfortunately other security issues are warning them. It was recently discovered a new vulnerability dubbed Certifi-Gate which could be […]

Pierluigi Paganini August 10, 2015
Hacking airport security systems with a common laptop

Hackers can compromise airport security networks by using a common laptop, this is the disconcerting discovery of the popular expert Billy Rios. Cyber security from I-Team investigation revealed that hackers could have the ability to shut down an airport’s security network just using a laptop. It is embarrassing read that system designed to improve security of the […]

Pierluigi Paganini August 10, 2015
Hackers can remotely steal fingerprints from Android devices

Researchers from FireEye have revealed that it is possible to attack Android smartphone to remotely steal user’s fingerprints on a “large scale.” Security experts have often expressed concerns regarding the fingerprint management implemented by the principal mobile vendors. Hackers have demonstrated that it is not difficult to trigger vulnerabilities inside systems that manage fingerprints in […]

Pierluigi Paganini August 09, 2015
Security Affairs newsletter Round 21 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Hacking Industrial Ethernet Switches to take over nuclear plants Microsoft Windows 10 spies on you by default Operation Potao – hackers used a trojanized version of TrueCrypt Mt Goxs […]

Pierluigi Paganini August 09, 2015
Carphone Warehouse hacked: 2.4 million customer records at risk

Carphone Warehouse has taken three days to disclose about a sophisticated attack that may have impacted more than 2.4 million customers. The British mobile phone retailer Carphone Warehouse has been hacked and nearly 2.4 million customers records could have been compromised. On 5 August 2015 the experts of the company discovered that the IT infrastructure […]

Pierluigi Paganini August 09, 2015
ZigBee-sniffing drone used to map online Internet of Things

A group of researchers launched an aerial security scanning project relying on ZigBee-sniffing drone to map online Internet of Things. Drones are powerful machines and security experts are imagining day by day new usage scenarios. A group of security experts (Paul West Jauregui, Richard McPherson, Dallas Kaman, and Nishil Shaw, partnered with Chris Eyhorn) are […]