Breaking News

Pierluigi Paganini March 12, 2015
Hacking Facebook by exploiting two reflected file download flaws

A security researcher has discovered two different  reflected file download flaws in Facebook that could be exploited to hit its users. Security researcher David Sopas from WebSegura has discovered a couple of security flaw in Facebook that could be exploited by an attacker respectively to upload an arbitrary file to the social network or to gain control […]

Pierluigi Paganini March 12, 2015
Malware “TreasureHunter” innovates by using windows products IDs for its dynamic mutex

A new approach based on windows products IDs for dynamic mutex could allow the creation of new malware running undetected on systems for much more time. Before talking about “TreasureHunter” itself, I think it’s worth to give you a background about mutex and as Microsoft says: “For example, to prevent two threads from writing to […]

Pierluigi Paganini March 11, 2015
Pentagon plans to hire 3,000 Cyber pros for the US Cyber Command

Federal officials announced that military received the green light to hire 3,000 cyber experts to assign to the US Cyber Command. Information warfare is strategic for almost every government, North Korea, Russia, China, Danmark are among the countries that are more investing to improve their cyber capabilities, and of course, the Five Eyes. The US Department of […]

Pierluigi Paganini March 11, 2015
Reconnect tool for hacking Facebook is publicly available

The security expert Egor Homakov from Sakurity firm has released the Reconnect tool that allows hackers to hijack accounts on sites that use Facebook logins. The security expert Security Egor Homakov has developed a hacking tool dubbed Reconnect that exploit a flaw in Facebook to hijack accounts on sites that use Facebook logins. Homakov, with works for […]

Pierluigi Paganini March 11, 2015
Apple and Microsoft released updates to fix the FREAK flaw

Microsoft and Apple released security updates to fix the FREAK vulnerability recently discovered and affecting their products. FREAK is a major security flaw recently discovered that left users of Apple and Google devices exposed to MITM attack while visiting supposedly secure Websites. At the same time Microsoft issued a specific security advisory to inform its […]

Pierluigi Paganini March 11, 2015
Exploiting the Rowhammer flaw in DRAM to control your PC

Researchers at Google’s Project Zero have demonstrated how to exploit Rowhammer problem in DRAM to gain kernel privileges on Linux systems. Security researchers at Google’s Project Zero team have demonstrated that is possible to hijack the Intel-compatible PCs running Linux by exploiting the physical weaknesses in certain varieties of DDR DRAM (double data rate dynamic random-access […]

Pierluigi Paganini March 11, 2015
Worm Gazon, fake Amazon gift card is targeting Android users

Android Gazon malware redirects a potential victim to a webpage that promises an Amazon gift card if you install an APK file hosted on the page. There is a new piece of malware called “Gazon”, and according to “adaptivemobile” already 4000 android users are infected. “Gazon” was discovered on 25 of February and until yesterday […]

Pierluigi Paganini March 10, 2015
How the CIA is working to break the security of Apple devices

A new interesting report published by The Intercept details the effort spent by the US intelligence to compromise the security of Apple devices. The Intercept published another disconcerting post on the US Intelligence campaign aimed to steal the secrets of the IT giant Apple. According to top-secret documents disclosed by The Intercept a team of researchers working with the Central […]

Pierluigi Paganini March 10, 2015
Crooks use seemingly harmless help files to serve CryptoWall ransomware

Experts at Bitdefender revealed that crooks used seemingly harmless help files to distribute a variant of the popular ransomware CryptoWall. The cybercrime never ceases to surprise, every time we discuss a new and effective technique to deceive victims and evade detection mechanisms. Security experts at Bitdefender have discovered a new spam campaign that targeted a few […]

Pierluigi Paganini March 10, 2015
Cyber Experts in North Korea Target the West and Especially Infrastructure of Critical Importance

North Korea holds an impressive army of cyber warriors, with over 3,000 sophisticated professionals. According to the claims of people who have escaped to South Korea, their main target is none other than Western infrastructure of critical value. Over 3,000 cyber experts have been recruited by North Korea, in the country’s attempt to harm the […]