Breaking News

Pierluigi Paganini March 27, 2015
Reading the Secunia Vulnerability Review 2015

Secunia firm issued its annual report on vulnerabilities exploited in 2014 in most popular software, a document which includes key figures and facts. Secunia has recently released its annual study of trends in software vulnerabilities, an interesting report that highlights the impact of the presence of flaws in common software and provide useful details on the […]

Pierluigi Paganini March 27, 2015
Support Dell System Detect tool put PCs at risk

The exploitation of the Dell System Detect tool would allow threat actors to remotely install malware on users’ your Dell computers. This specific subject was already talked in mid-November 2014 when it was discovered and reported to Dell which patched it in January 2015, but it’s uncertain if the fix closed all the “holes”. The […]

Pierluigi Paganini March 27, 2015
Hotel ANTLabs InnGate Internet Gateways vulnerable against remote exploit

The presence of a vulnerability in the ANTLabs InnGate devices used in hotels and conference centers exposes users to risk of remote exploit. Recently the security firm Cylance has discovered a vulnerability (CVE-2015-0932) affecting the ANTLabs InnGate devices that are popular Internet gateway for visitor-based networks like the one we find in hotels and convention centers. The exploitation […]

Pierluigi Paganini March 27, 2015
Bar Mitzvah attack exploits the Invariance Weakness in RC4

Bar Mitzvah is the name of a new attack on RC4-Based SSL/TLS encryption that allows disclosure of sensitive data by exploiting  a 13-Year-Old Vulnerability. Both Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) cryptographic protocols rely on the Rivest Cipher 4 (RC4) algorithm to encrypt data transfers. The problem is that the […]

Pierluigi Paganini March 26, 2015
Health records are the new goldmine for hackers

According to Top CSO news website, security experts predict that “Health records are worth more and easier to get than credit card data” The rise in health data breach headlines, may not necessarily suggest an increase in actual data breaches. It’s possible that organizations are just getting better at discovering that they’ve been breached, so […]

Pierluigi Paganini March 26, 2015
Crooks are improving sextortion with the use of mobile malware

According to Trend Micro, crooks in Asia are conducting the sextortion practice to the next level, including the used of mobile malware to get huge profits. Trend Micro released a new report to bring to light a criminal activity known as sextortion. “Sextortion is a means of coercing cybercrime victims to perform sexual favors or […]

Pierluigi Paganini March 26, 2015
Slides reveal Canadian CSE secret hacking capabilities

The last collection of top-secret slides leaked by Snowden and disclosed by media agencies reveal the hacking capabilities and platforms of Canadian CSE. The last collection of top-secret documents leaked by the whistleblower Edward Snowden, and published by The Intercept  and the Canadian Broadcasting Corporation,  leaked documents reveal the Canadians are a dab hand at cyber-stuff, […]

Pierluigi Paganini March 26, 2015
Setting issue in Windows 7 and 8.1 could allow privilege escalation

Experts of the Project Zero have disclosed a proof-of-concept for the exploitation of a default setting in Windows 7, 8.1 that allow privilege escalation. A new security issue threatens users of Windows 7 and 8.1, this time experts are warning about a default setting in both OSs that could allow local users to elevate privileges […]

Pierluigi Paganini March 26, 2015
Vawtrak malware uses steganography to hide update files in favicons

A new strain of Vawtrak malware implements capabilities to send and receive data through encrypted favicons distributed over the Tor network. A new powerful variant of the Vawtrak malware, also known as Neverquest or Snifula, appeared in the wild. Vawtrak is considered by malware researchers one of the most dangerous malicious code that is threatening systems worldwide. The […]

Pierluigi Paganini March 25, 2015
BitWhisper – hacking Air-Gapped PCs through heat emissions

Israeli Researchers have defined a new exfiltration technique dubbed BitWhisper that is based on the heat emissions and built-in thermal sensors. According researchers at the Ben Gurion University in Israel, by detecting the heat from one computer to an adjacent computer, is possible to establish a channel that can  claiming can facilitate the spread of keys, malicious […]