Hacking

Pierluigi Paganini April 12, 2016
How to restore files encrypted by the Petya ransomware in less than 7 seconds

Security Researchers have developed a decryption tool to restore the files encrypted by the Petya ransomware with a key generated in less than 10 seconds. Security researchers have analyzed the code of Petya ransomware in order to devise a method to allow victims to restore encrypted files. The experts have been able to develop a decryption tool […]

Pierluigi Paganini April 11, 2016
British youngster pleading guilty to booter and malware sales

Teenage hacker developed a dangerous booter that was offered for sale, it was used to crash 224,000 websites around the world. Not always crime pays, sometimes the bill can be very salty, this is the case of a British youngster from Worcestershire, Grant Manser, that has pleaded guilty to six charges under the Computer Misuse Act and […]

Pierluigi Paganini April 11, 2016
Bug Bounty Program is becoming more popular in Japan

Sprout, the cybersecurity firm in Japan has launched BugBounty.jp, which is the first bug bounty program in Japan designed to Japanese companies. Sprout, the cybersecurity firm in Japan has launched BugBounty.jp (https://bugbounty.jp/), which is the first bug bounty platform in Japan designed to Japanese companies easily run bug bounty programs, and get helps from white hat hackers around the […]

Pierluigi Paganini April 11, 2016
Researchers devised a reCaptcha breaking system effective against Google and Facebook

A group of boffins discovered vulnerabilities in the reCaptcha systems of Google and Facebook and devised an attack method. The security experts Suphannee Sivakorn, Iasonas Polakis, and Angelos D. Keromytis have devised an attack technique against Facebook and Google reCaptcha. The boffins from the Department of Computer Science at Columbia University have discovered security vulnerabilities […]

Pierluigi Paganini April 10, 2016
Be careful products sold on Amazon are infected with malware

Beware, even things on Amazon come with embedded malware… this is the disconcerting discovery made by the expert Mark Olsen. The security expert Mike Olsen warned about the presence of malware in products sold through the Amazon service. Olsen was searching for outdoor surveillance cameras on Amazon for a friend’s home. He has found an interesting offer […]

Pierluigi Paganini April 10, 2016
Cyber Justice Team claims a massive Data Leak from the Syrian Gov

The Cyber Justice Team claims a massive Data Leak from the Syrian Government, more than 43 GB of Data available Online The hacker group named Cyber Justice Team leaked 10 GB of compressed data (when decompressed are over 43 GB of data) from several Syrian government and private companies. The group claimed to have hacked Linux […]

Pierluigi Paganini April 09, 2016
FBI reveals BEC attacks pilfered $2.3bn from US companies

According to a report recently issued by the FBI, cyber criminals have pilfered more than $2.3bn from 17,642 victims since 2013 with BEC attacks. According to the FBI, cyber criminals have stolen more than $2.3bn from 17,642 victims since 2013 in BEC attacks. The situation is critical, the number of business email compromise BEC scams continues to increase on […]

Pierluigi Paganini April 08, 2016
More than 135 million ARRIS cable modems vulnerable to remote attacks

Attackers can exploit the flaws in the ARRIS SURFboard cable modems to remotely knock out the device, more than 135 million device open to attacks. The security expert David Longenecker reported security vulnerabilities affecting the popular broadband cable SURFboard modems produced by the ARRIS (formerly Motorola). The ARRIS  SB6141 model is available for sale for around $70 US, […]

Pierluigi Paganini April 08, 2016
The FBI director confirmed the purchase of a tool to hack the shooter’s iPhone, but …

The FBI Director James Comey confirmed the Agency had purchased a hacking tool to crack the San Bernardino shooter’s iPhone, but … The FBI has found a way to unlock any Apple iPhone, this is the opinion of the majority of security experts. Apple has expressed its concerns about the technique adopted by the Feds to access data […]

Pierluigi Paganini April 06, 2016
Adobe to patch Flash Player zero-day vulnerability actively exploited in the wild

A new Flash Player zero-day vulnerability (CVE-2016-1019) has been actively exploited by threat actors in attacks against systems running Windows XP and 7. Once again a zero-day vulnerability in the Adobe Flash Player 21.0.0.197 is threatening Internet users worldwide. The news was spread by Adobe that issued a security alert on Tuesday anticipating an imminent […]