Hacking

Pierluigi Paganini August 20, 2019
Flaw in New Facebook Design Allowed Removal of Profile Photos

A security vulnerability in the Facebook design (FB5) could have allowed attackers to remove any photo from profiles of the users. The security expert Philippe Harewood is one of the security researchers that received early access by Facebook to the new FB5 design and discovered an important design flaw. Harewood explained that the issue affects the […]

Pierluigi Paganini August 20, 2019
5 Ways to Protect Yourself from IP Address Hacking

Your IP address represents your digital identity online, hacking it not only allows attackers to access your device or your accounts, but it may cause even bigger damage. Your IP or Internet Protocol address is your digital identity on the internet. It allows your device to connect with the rest of the online world. For […]

Pierluigi Paganini August 20, 2019
Backdoored Webmin versions were available for download for over a year

Webmin, the popular open-source web-based interface for Unix admin contained a remote code execution vulnerability for more than a year. Webmin is an open-source web-based interface for system administration for Linux and Unix. It allows users using web browsers to set up user accounts, Apache, DNS, file sharing and much more. News of the day […]

Pierluigi Paganini August 19, 2019
Hacker publicly releases Jailbreak for iOS version 12.4

Apple accidentally unpatched a vulnerability it had already fixed, making current versions of iOS vulnerable to hackers. A public Jailbreak for iPhones in was released by a hacker, it is an exceptional event because it is the first in years. According to Motherboard, that first reported the news, Apple accidentally unpatched a flaw it had […]

Pierluigi Paganini August 19, 2019
5 Common Phishing Attacks and How to Avoid Them?

Phishing is one of the oldest methods of cyberattacks. It uses deceptive and manipulated emails as a tool for gathering personal and organizational data. The emails are designed in a way that it appears to be authentic or belonging from a real business or authoritative source. People fell prey for these manipulative emails and provide […]

Pierluigi Paganini August 18, 2019
At least 23 Texas local governments targeted by coordinated ransomware attacks

At least 23 local governments were impacted by a wave of ransomware attacks that according to the experts are the result of a coordinated effort. Texas is the victim of an ongoing wave of ransomware attacks that are targeting local governments. At least 23 local government organizations were impacted by the ransomware attacks, the Department […]

Pierluigi Paganini August 18, 2019
Bluetana App allows detecting Bluetooth card skimmers in just 3 seconds

Bluetana App allows detecting Bluetooth card skimmers installed at the gas pumps to steal customers’ credit and debit card information in just 3 seconds on average. Bluetooth card skimmers continue to be one of the favorite tools in the arsenal of crooks that attempt to steal credit and debit card information. In recent years, law […]

Pierluigi Paganini August 18, 2019
Capital One hacker suspected to have breached other 30 companies

Federal prosecutors revealed that Paige Thompson, who was arrested after the Capital One data breach, may have hacked more than 30 other organizations. In July, Capital One, one of the largest U.S. –card issuer and financial corporation suffered a data breach that exposed personal information from 106 million Capital One credit applications. A hacker that goes […]

Pierluigi Paganini August 17, 2019
Trend Micro addressed two DLL Hijacking flaws in Trend Micro Password Manager

Trend Micro addressed 2 DLL hijacking flaws in Trend Micro Password Manager that could allow malicious actors to escalate privileges and much more. Security expert Peleg Hadar from SafeBreach discovered a DLL hijacking vulnerability in the Trend Micro Password Manager that could be exploited to execute arbitrary code with the permissions of the most privileged […]

Pierluigi Paganini August 17, 2019
Expert shows how to bypass a fix for a recently discovered Steam flaw

A security researcher demonstrated how to bypass a fix released by Valve for a recently discovered Steam vulnerability re-enabling the attack. A few days ago, the security experts Matt Nelson and Vasily Kravets separately disclosed a privilege escalation vulnerability in the Stream client for Windows that can be exploited by an attacker with limited permissions to run code administrative […]