Breaking News

Pierluigi Paganini August 09, 2015
RollJam, a $30 device to unlock the majority of car doors

RollJam is a $30 device designed to exploit a design flaw in the protocol that determines how keys communicate with car and unlock the majority of car doors. The recent hacks of the Jeep Cherokee and the security patch issued by Tesla for its model S have raised the discussion on the car hacking. Now, security experts […]

Pierluigi Paganini August 08, 2015
Hacking Windows Server Update Services to infect enterprises

Two researchers demonstrated how to compromise corporate networks by hacking the Windows Server Update Services and serve malware instead security patches. Security researchers from Context security firm have discovered a technique to serve malware exploiting the Windows update mechanism. The researchers are able to exploit insecurely configured implementations of Windows Server Update Services (WSUS) for an enterprise […]

Pierluigi Paganini August 08, 2015
0-day attack on Firefox stole sensitive data and password

Mozilla released the version 39.0.3 Firefox to patch a critical 0-day vulnerability that has been exploited in the wild. A zero-day vulnerability in Mozilla FireFox was reported on Wednesday to the company. A user noticed that an ad displayed on a Russian news website was serving an a malicious code. The exploit discovered by the user […]

Pierluigi Paganini August 07, 2015
Hackers are targeting Gas Tanks worldwide

Security experts from Trend Micro have set up a number of honeypot to study the cyber attacks on vulnerable gas tanks and worldwide. Security researchers at Trend Micro, Kyle Wilhoit and Stephen Hilt have discovered a number of cyber attacks attempting to hack and shut down gas tanks. The researchers have set up honeypots to study […]

Pierluigi Paganini August 07, 2015
Hacking Team compromised non-jailbroken iOS devices

Security experts from FireEye demonstrated that Hacking Team leveraged iOS vulnerability to install fake messaging apps implementing a Masque Attack. Another news related with the leak of the Hacking Team‘s hack, this time it was discovered that Hacking Team was capable of compromising IOS devices, even if they weren’t jailbroken. To accomplish this, Hacking Team […]

Pierluigi Paganini August 07, 2015
Tesla Motor sent a patch to fix flaws in its connected car

Tesla Motors Inc admitted to have sent an update to patch security vulnerabilities discovered by a couple of cyber security experts. Tesla Motors Inc has announced that it has distributed a software update to fix security vulnerabilities in the Tesla Model S sedan. According to the company an attacker by exploiting the flaw could take […]

Pierluigi Paganini August 06, 2015
Once again alleged Russian hackers hit the Pentagon computers

NBC News reported Russian hackers have compromised computers at the Pentagon, an unclassified email system has been shut down  in response of the attack. According to the NBC news, US officials have reported that Russia launched a “sophisticated cyberattack” against the Pentagon’s Joint Staff unclassified email system. The unclassified email system has been shut down […]

Pierluigi Paganini August 06, 2015
Funtenna can remotely steal data from air-gapped network using sound waves

A group of researchers has presented at the Black Hat conference Funtenna, a hacking technique to steal data from air-gapped network based on sound waves. Imagine, If a remote hacker could steal classified information from a targeted computer without having to physically and Internet access to it. A team of security researchers has demonstrated how […]

Pierluigi Paganini August 06, 2015
ICANN urges passwords reset due an external service provider breach

The ICANN has issued a warning to inform who registered with ICANN.org that their profile accounts were accessed by an “unauthorized person.” The Internet Corporation for Assigned Names and Numbers (ICANN) has issued another security warning after login credentials of the ICANN.org website have been compromised. A new incident occurred to the ICANN (Internet Corporation for […]

Pierluigi Paganini August 06, 2015
The Panda Emissary APT specialized in defence aerospace projects

The Panda Emissary group extensively uses long-running strategic web compromises and relies on whitelists to syphon defence aerospace projects from victims. An alleged Chinese APT group dubbed Panda Emissary (also known as TG-3390) is targeting high-profile governments and organisations searching for defense aerospace projects. Researchers at Dell discovered that the Panda Emissary group used Watering hole […]