Hacking

Pierluigi Paganini July 30, 2017
DEF CON 25 – BBC Micro:bit could be used to hijack a drone

A security researcher demonstrated how to use a pocket-sized microcomputer BBC’s Micro:bit to take control of a quadcopter drone. In a talk at the at year’s DEF CON hacking conference in Las Vegas, Damien Cauquil, a security researcher at Econocom Digital Security, demonstrated how to use a pocket-sized microcomputer such BBC’s Micro:bit to sniff out keystrokes from a wireless keyboard or […]

Pierluigi Paganini July 29, 2017
Chinese researchers from Tencent hacked a Tesla model once again

A team of security researchers from Chinese firm Tencent has once again demonstrated how to remotely hack a Tesla Model vehicle. Security researchers from Chinese firm Tencent have once again demonstrated how to remotely hack a Tesla Model vehicle. Once the experts reported the flaws to the car makers it promptly patched them. In a […]

Pierluigi Paganini July 29, 2017
BlackHat 2017 – Positive Technologies researcher claims ApplePay vulnerable to two distinct attacks

BlackHat 2017 – Security expert at Positive Technologies claims ApplePay vulnerable to two distinct attacks. At the Black Hat USA hacking conference,  security researchers from Positive Technologies announced to have devised two distinct attacks against ApplePay exploiting weaknesses in the mobile payment method. ApplePay is considered today one of the most secure payment systems, but Positive Technologies […]

Pierluigi Paganini July 28, 2017
Critical Vulnerabilities discovered in Radiation Monitoring Devices (RDMs) used at Power Plants and Airports

Experts discovered flaws in widely deployed Radiation Monitoring Devices (RDMs) that could be triggered to raise false alarms and worse. This week at Black Hat in Las Vegas, researchers at information security firm IO Active, disclosed their findings on radiation monitoring devices from Ludum, Mirion, and Digi that were found to contain multiple unpatched vulnerabilities. […]

Pierluigi Paganini July 28, 2017
BLACK HAT USA – Hackers turn car washing machines in a mortal trap

BLACK HAT USA – Experts show how hackers can cause physical damage to vehicles and injure drivers by remotely hacking a connected car washing machines. What about hacking into Internet-connected car wash machines? It is a scarring scenario, hackers from anywhere in the world could transform car washing machines into death traps. In a talk at […]

Pierluigi Paganini July 28, 2017
Wikileaks Vault 7 – Imperial projects revealed the 3 hacking tools Achilles, SeaPea and Aeris

Wikileaks published another batch of classified documents from the CIA Vault 7 leak, it includes details of the Imperial project. Today another batch of classified documents from the CIA Vault 7 leak was published by Wikileaks. The documents are related to a CIA project codenamed ‘Imperial,’ they include details of three CIA hacking tools and implants that […]

Pierluigi Paganini July 27, 2017
DEF CON Talk Will Expose The Latest SMB Vulnerability SMBLoris

Security researchers at RiskSense have identified a 20-year-old Windows SMB vulnerability they are calling SMBloris, a DEF CON Talk Will Expose it. Server Message Block (SMB) has been a foundational piece of Microsoft Windows’ networking all the way back to the LAN Manager days, facilitating “shared access to files, printers and serial ports.” It is […]

Pierluigi Paganini July 27, 2017
Experts found critical flaws in Diebold Opteva ATM that allow to vend notes from the machine

Experts at the US firm IOActive have discovered a critical physical and authentication bypass vulnerability in the Diebold Opteva ATM. The researchers have found two vulnerabilities in the Diebold Opteva ATM machines with the AFD platform that could be chained to allow an unauthorized user to vend notes from the device. “IOActive has discovered two vulnerabilities in Opteva […]

Pierluigi Paganini July 26, 2017
CrowdStrike presented the fastest and largest cybersecurity search engine

CrowdStrike Inc., the leader in cloud-delivered endpoint protection, announced the fastest and largest cybersecurity search engine. Security firm CrowdStrike, the leader in cloud-delivered endpoint protection, announced a significant improvement of its Falcon platform that has been integrated with a powerful cybersecurity search engine. According to the company the cybersecurity search engine has high performance, it claims it […]

Pierluigi Paganini July 25, 2017
Experts detailed the new Operation Wilted Tulip campaign of the CopyKittens APT

Researchers from ClearSky and Trend Micro uncovered a new massive cyber espionage campaign conducted by CopyKittens dubbed ‘Operation Wilted Tulip’ A joint investigation conducted by experts from the Israeli cyber-intelligence firm by ClearSky and Trend Micro uncovered a new massive cyber espionage campaign dubbed ‘Operation Wilted Tulip’ conducted by an Iran-linked APT group CopyKittens (aka Rocket Kittens). The […]