Hacking

Pierluigi Paganini September 20, 2016
A mistake allowed us a peek into North Korea Internet infrastructure

A mistake allowed us a peek into the North Korea Internet infrastructure, a security researcher discovered that Pyongyang has just 28 websites. The North Korea is one of the countries that most of all is investing to improve its cyber capabilities and that has one of the largest cyber armies. But North Korea is also known for […]

Pierluigi Paganini September 20, 2016
Car Hacking – Chinese hacker team remotely hacked Tesla Model S

A group of security researchers from the Chinese firm Tencent have found a series of flaws that can be exploited to remotely hack a Tesla Model S. Security experts at the Keen Lab at Chinese firm Tencent have found a series of vulnerabilities that can be exploited by a remote attacker to hack an unmodified […]

Pierluigi Paganini September 20, 2016
How an insecure messaging app led to fall of a terrorist organization in Turkey?

MIT (Turkish Intelligence Agency) has hacked one-single server of a messaging app in Lithuania in order to identify members of an Islamic terrorist group. Within the harshness of political controversies turned up in Turkey with the recent coup attempt at July of 15th [1], it seems that a cyberwar between MIT [2] (Turkish National Intelligence […]

Pierluigi Paganini September 19, 2016
CVE-2016-6415 – CISCO confirms a new Zero-Day linked to Equation Group hack

Cisco revealed the existence of another zero-day vulnerability, tracked as CVE-2016-6415, in the Equation Group archive leaked by the Shadow Broker hackers. This summer a group of hackers known as Shadow Brokers hacked into the arsenal of the NSA-linked group Equation Group and leaked roughly 300 Mb of exploits, implants, and hacking tools. The existence of the […]

Pierluigi Paganini September 18, 2016
Mozilla will fix the cross-platform RCE flaw that threatened Tor anonymity

Mozilla plans to fix the cross-platform RCE flaw that threatened Tor anonymity. The flaw affects certificate pinning protections implemented by Mozilla. Mozilla plans to release a Firefox update to address the cross-platform remote code-execution vulnerability recently patched in the Tor browser. The tor is inviting its users to install the security update urgently, and Mozilla follows close […]

Pierluigi Paganini September 17, 2016
Hacking Facebook pages? Hackers demonstrated how to do it in 10 secs

Hacking Facebook – An Indian researcher discovered a critical vulnerability in the Facebook business manager that could be exploited to hack any Page. The Indian security researcher Arun Sureshkumar reported a critical vulnerability in the Facebook business manager that could be exploited by attackers to hack any Facebook page. The Business Manager is the component […]

Pierluigi Paganini September 17, 2016
NAND mirroring – Unlock San Bernardino shooter’ iPhone with just $100

A researcher has demonstrated that the NAND mirroring technique was able to bypass the passcode retry limitations on the San Bernardino shooter’s iPhone. The battle between the FBI and Apple for unlocking an iPhone 5C belonging to the San Bernardino shooter went in the headlines in the first part of the year. Apple refused to unlock the device, the […]

Pierluigi Paganini September 16, 2016
Cisco releases multiple Security Updates, it fixed a nasty RCE in WebEx Meetings servers

Cisco has released several Security Updates to fix many vulnerabilities in its products, including a nasty RCE in WebEx Meetings servers. Cisco has issued a patch to address the remote code execution flaw (CVE-2016-1482) that affects company WebEx Meetings servers. The remote code execution flaw (CVE-2016-1482) could be exploited by remote, unauthenticated attackers to execute arbitrary commands […]

Pierluigi Paganini September 16, 2016
Akamai Q2 2016 report, the number of DDoS attacks has doubled in one year

According to the Akamai Q2 2016 report, the number of distributed denial of service attacks has doubled over the last 12 months. The DDoS attacks continue to be privileged attack vectors for crooks, according to the last report published by Akamai (Akamai Q2 2016 report) the number of distributed denial of service attacks has doubled over […]

Pierluigi Paganini September 15, 2016
A backdoor on Xiaomi device allows silent and remote deliver of any app

A Dutch Computer Science student discovered the presence of a backdoor that could allow an attacker to silently install any app on Xiaomi phones. A Dutch Computer Science student, Thijs Broenink, who analyzed his Xiaomi mobile device discovered the presence of a backdoor that could allow an attacker to silently install any app on the phone. The […]