Hacking

Pierluigi Paganini January 19, 2017
2016 Christmas Ukraine power outage was caused by hackers

Ukrenergo confirmed that preliminary results of its investigation showed that the Ukraine power outage that occurred in December was caused by hackers. In December 2016, the Government Ukraine energy company Ukrenergo suffered a severe power outage that affected the ”North” substation at Pivnichna. The incident caused blackouts in the city of Kyiv and neighboring regions. The […]

Pierluigi Paganini January 19, 2017
Crashing iPhone Or iPad with a simple Emoji text message

A simple sequence of three character-long text message containing Emoji can cause the block and the reboot os iPhones and iPads running iOS 10.1 or below. A new Apple’s iOS bug was discovered in the community of mobile tech experts, it can be exploited to crash iPhone or iPad devices by just sending an Emoji […]

Pierluigi Paganini January 19, 2017
US-CERT – Warning, Shadow Brokers Hackers are offering an SMB Zero-Day exploit

The US-CERT has issued a warning after the Shadow Brokers hackers have offered to sell what it claims to be an SMB Zero-Day exploit. The United States Computer Emergency Readiness Team (US-CERT) has issued a warning after the Shadow Brokers hacker group has offered to sell what it claims to be an SMB Zero-Day exploit. […]

Pierluigi Paganini January 18, 2017
The Carbanak gang is with a new modus operandi, Google services as C&C

The infamous Carbanak cybercrime gang is back and is leveraging Google services for command-and-control of its malicious codes. The dreaded Carbanak cybercrime gang is back and is adopting a new tactic for its attacks, it is leveraging Google services for command-and-control of its malware. The criminal organization is named Carbanak cybergang because of the name […]

Pierluigi Paganini January 18, 2017
Hacker found a way to hack Facebook by exploiting the ImageMagick flaw

The bug hunter Andrew Leonov has described how to exploit an ImageMagick flaw to remotely execute code on a Facebook server. The hacker Andrew Leonov (@4lemon) has described how to exploit the so-called ImageMagick vulnerability to remotely execute code on a Facebook server. The ImageMagick flaw, tracked as CVE-2016-3714, affects the popular image manipulation software, ImageMagick. The flaw could […]

Pierluigi Paganini January 17, 2017
Thai TrueOnline ZyXEL and Billion routers still unpatched since July

The security researcher Pedro Ribeiro disclosed several vulnerabilities in the ZyXEL customized routers that could be easily exploited by hackers. Details on serious vulnerabilities in a number of routers freely distributed by the TrueOnline Thai ISP were published on Monday after private disclosures made to the vendors in July went unanswered. The security researcher Pedro Ribeiro from […]

Pierluigi Paganini January 17, 2017
Watch out, hackers can listen to your Facebook Messenger Chats

A security expert discovered a flaw in the Facebook Messenger audio clip recording feature that could be exploited to listen to audio chats. Voice recording is one of the most important features of instant messaging systems, it allows users to rapidly send messages in an easy way avoiding typing them. WhatsApp, Facebook Messenger, and others […]

Pierluigi Paganini January 17, 2017
Russian Channel One alleged hacked and BBC Sherlock Final Leaked

On Monday, Russian State Television Channel One leaked online the BBC Sherlock Final episode, the broadcaster blames hackers. On Monday, a Russian state television Channel One blamed hackers for the leak online of the final episode of the BBC drama Sherlock a day before its actual planning. The Russian Channel One was set to transmit the end-of-season […]

Pierluigi Paganini January 17, 2017
Hackers demonstrate how to hack Samsung SmartCam

Researchers Exploitee.rs discovered a flaw in Samsung SmartCam IP cameras that could be exploited to execute commands and hijack vulnerable devices. Samsung SmartCam IP cameras are affected by a serious vulnerability that could be exploited by remote attackers to execute commands and hijack vulnerable devices. Samsung Electronics sold the Samsung Techwin security division to the Hanwha […]

Pierluigi Paganini January 16, 2017
Insidious phishing attack leverages on fake attachments to steal Gmail credentials

Cybercriminals are adopting specially crafted URLs to trick users into entering their Gmail credentials in a new sophisticated phishing campaign. Security experts discovered a new effective Gmail phishing attack that is able to deceive also tech-savvy people. Crooks leverage on specially crafted URLs to trick victims into providing their Gmail credentials on a phishing page. The malicious messages are sent […]