Cyber Crime

Pierluigi Paganini August 11, 2015
VBE files on the rise in Brazil leading to Financial Fraud

Security experts at Kaspersky Lab recently observed a big wave of malicious VBE files targeting Brazilian users to distribute Financial Trojan. Recently security experts have seen old tricks rising from the dead (like for example word/excel macros attachment in e-mails) and malicious VBE files are being spread via email targeting Brazilian users. These VBE files […]

Pierluigi Paganini August 10, 2015
IT giants join forces to combat child sexual abuse imagery

Facebook, Google, Twitter, Microsoft and Yahoo and the Internet Watch Foundation (IWF) are joining their efforts in the fight against child sexual abuse. Facebook, Google, Twitter, Microsoft and Yahoo are joining their effort in the fight against child sexual abuse. The IT giants child after joining forces with a the UK charity, the Internet Watch Foundation […]

Pierluigi Paganini August 10, 2015
Hacking airport security systems with a common laptop

Hackers can compromise airport security networks by using a common laptop, this is the disconcerting discovery of the popular expert Billy Rios. Cyber security from I-Team investigation revealed that hackers could have the ability to shut down an airport’s security network just using a laptop. It is embarrassing read that system designed to improve security of the […]

Pierluigi Paganini August 09, 2015
Security Affairs newsletter Round 21 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Hacking Industrial Ethernet Switches to take over nuclear plants Microsoft Windows 10 spies on you by default Operation Potao – hackers used a trojanized version of TrueCrypt Mt Goxs […]

Pierluigi Paganini August 09, 2015
Carphone Warehouse hacked: 2.4 million customer records at risk

Carphone Warehouse has taken three days to disclose about a sophisticated attack that may have impacted more than 2.4 million customers. The British mobile phone retailer Carphone Warehouse has been hacked and nearly 2.4 million customers records could have been compromised. On 5 August 2015 the experts of the company discovered that the IT infrastructure […]

Pierluigi Paganini August 08, 2015
0-day attack on Firefox stole sensitive data and password

Mozilla released the version 39.0.3 Firefox to patch a critical 0-day vulnerability that has been exploited in the wild. A zero-day vulnerability in Mozilla FireFox was reported on Wednesday to the company. A user noticed that an ad displayed on a Russian news website was serving an a malicious code. The exploit discovered by the user […]

Pierluigi Paganini August 06, 2015
ICANN urges passwords reset due an external service provider breach

The ICANN has issued a warning to inform who registered with ICANN.org that their profile accounts were accessed by an “unauthorized person.” The Internet Corporation for Assigned Names and Numbers (ICANN) has issued another security warning after login credentials of the ICANN.org website have been compromised. A new incident occurred to the ICANN (Internet Corporation for […]

Pierluigi Paganini August 06, 2015
The Panda Emissary APT specialized in defence aerospace projects

The Panda Emissary group extensively uses long-running strategic web compromises and relies on whitelists to syphon defence aerospace projects from victims. An alleged Chinese APT group dubbed Panda Emissary (also known as TG-3390) is targeting high-profile governments and organisations searching for defense aerospace projects. Researchers at Dell discovered that the Panda Emissary group used Watering hole […]

Pierluigi Paganini August 06, 2015
Man-in-the-Cloud Attacks rely on common file synchronization services to hack cloud account

Popular cloud storage services such as Google Drive and Dropbox can be abused by hackers running Man-in-the-Cloud (MITC) attacks. The recently issued Imperva’s Hacker Intelligence Initiative report on Man-in-the-Cloud (MITC) attacks details how threat actors abuse popular cloud storage services for illegal activities. The experts have analyzed a number of cloud storage services including Dropbox, Google Drive, Box, and Microsoft OneDrive. […]

Pierluigi Paganini August 05, 2015
Terracotta VPN, the Chinese VPN Service as Hacking Platform

A Chinese-language Virtual Private Network service provider dubbed Terracotta VPN offers a network of compromised servers as a stealth hacking platform. According RSA Security, a China-based virtual private network (VPN) service provider offers hacking crews a network of compromised servers which can be used to carry out stealth cyber attacks. The attacks appear to be […]