Cyber Crime

Pierluigi Paganini August 22, 2015
Thousands of WordPress sites host Neutrino Exploit Kit

Experts from security company Zscaler have uncovered a malware campaign which relies on thousands of hijacked WordPress sites hosting the Neutrino Exploit Kit. According to the experts at the Zscaler security firm, cybercriminals have compromised more than 2,600 WordPress websites over the past month and deployed malicious iframes on 4,200 distinct pages. The criminals exploited […]

Pierluigi Paganini August 21, 2015
Blue Termite APT group focuses on Japanese organizations

Security experts at Kaspersky Lab have analyzed the cyber attacks run by the Blue Termite APT, a hacking crew group focused on Japanese organizations. According to the experts at Kaspersky security firm, an ATP group dubbed Blue Termite has been active since at least November 2013 focusing its attacks on Japanese organizations. The Blue Termite APT […]

Pierluigi Paganini August 21, 2015
Web.com hacked, at least 93,000 credit card data exposed

The US-based web hosting company Web.com has been Hacked, it admitted that credit card information of 93,000 customers have been compromised. Web.com is the last victim of a data breach, the US-based web hosting company has up to 3.3 Million customers. According the first news circulating in the Internet the hackers may have compromised personal information and […]

Pierluigi Paganini August 20, 2015
Hackers released a second dump of Ashley Madison data

The hackers behind that data breach of the Ashley Madison website, who call themselves “Impact Team,” have released another dump of 20 GB. A few hours ago, Joseph Cox, contributor at MotherBoard confirmed that the hackers behind the Ashley Madison data breach released a new dump of website database. In the last days, 10GB of data apparently […]

Pierluigi Paganini August 20, 2015
Hackers have leaked Ashley Madison dump online

The hacking crew who breached the online adultery website Ashley Madison has leaked online a dump of the company’s websites containing user data. In July, the popular online cheating site Ashley Madison has been hacked and a big amount of data was stolen by hackers who posted part of this information online as proof of […]

Pierluigi Paganini August 19, 2015
Chip-and-PIN technology has been compromised

A new report published by the popular investigator Brian Krebs show how cyber criminals have compromised chip-and-PIN technology. Recently chip-and-PIN technology started to be adopted in the US because it would improve the security for the customers, merchants and financial institutions. This is true, but the problem is that when the market pushes in one […]

Pierluigi Paganini August 18, 2015
Hidden Tear Ransomware is now open Source and available on GitHub

The Turkish security researchers Utku Sen has published the first open source ransomware  for educational purposes that anyone can use. Ransomware is now open Source and available in GitHub. Ransomware is one of most dangerous cyber threats for end-users, in the recent months the number of ransomware in the wild is increased as never before. Criminal […]

Pierluigi Paganini August 18, 2015
SS7 flaw allows hackers to spy on every conversation

By Exploiting a flaw in the SS7 protocol hackers can access every conversation and text message mobile users send from everywhere in the world. Hackers can spy on every mobile phone user wherever it is. Channel Nine’s 60 Minutes has revealed the existence of a security hole in modern telecommunication systems that could be exploited by […]

Pierluigi Paganini August 17, 2015
Antivirus industry damaged by the Kaspersky’case

Kaspersky sustains the Reuters’s story on Antivirus false positives is based on information provided by anonymous former KL employees which are not reliable Some days ago, Reuters published a story about Kaspersky revealing that the Russian company was creating malicious codes to give them an upper hand against their direct competitors. Eugene Kaspersky in the […]

Pierluigi Paganini August 16, 2015
Security Affairs newsletter Round 22 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. ZigBee-sniffing drone used to map online Internet of Things RollJam, a $30 device to unlock the majority of car doors Tesla tech top dog downs slug of Scotch, increases […]