Hacking

Pierluigi Paganini February 13, 2016
The IPT ruled that GCHQ spies can legally hack any electronic devices

The British Intelligence Agency GCHQ has a license to hack computers and devices, the UK’s Investigatory Powers Tribunal (IPT) ruled. This means that the UK Government is giving full power to its intelligence agency to spy on Britons as well as people living abroad. The verdict was issued on Friday after Privacy International and seven ISPs […]

Pierluigi Paganini February 13, 2016
BlackEnergy infected also Ukrainian Mining and Railway Systems

Experts at Trend Micro discovered strains of BlackEnergy malware involved in the recent attacks against Ukrainian Mining and Railway Systems. BlackEnergy was in the headlines when the security industry examined the power outage occurred in Ukraine in December 2015. The BlackEnergy malware is a threat improved to target SCADA systems, the latest variant includes the KillDisk component developed to wipe […]

Pierluigi Paganini February 12, 2016
UK police arrested teenage hacker who allegedly hacked CIA and FBI officials

UK Police and FBI have arrested a teenager suspected to be Cracka, the hacker who hacked the CIA Director John Brennan. The Federal Bureau of Investigation (FBI) and British law enforcement have identified and arrested a teenage hacker alleged member of the hacking crew “Cracka with Attitude.” The Cracka with Attitude is the group of […]

Pierluigi Paganini February 12, 2016
The FBI requests $38 Million to counter the threat of Going Dark

The FBI requests $38 Million to counter the threat of Going Dark, in particular asking more economic resources to break encryption when needed. The FBI Director James Comey has highlighted in different occasions the difficulties faced by law enforcement when dealing with encryption during their investigations. Now, the FBI is making its request for budget […]

Pierluigi Paganini February 12, 2016
A replica of AlphaBay market used to steal login credentials

Fraudsters operating on the AlphaBay darknet market have deployed a replica of the popular marketplace to steal login credentials from peers. Paul Mutton, security experts at Netcraft, discovered a fake version of the Alphabay Market (pwoah7foa6au2pul.onion), one of the most popular black markets hosted in the dark web. Paul Mutton speculates that fraudsters have deployed […]

Pierluigi Paganini February 11, 2016
Once again identity thieves use stolen SSNs in IRS attack

The IRS detected roughly unauthorized attempts using 464,000 unique SSNs, and 101,000 attempts allowed crooks in generating PINs. The U.S. Internal Revenue Service (IRS) recently confirmed that cyber criminals abused the Electronic Filing PIN application. The Electronic Filing PIN application is running on irs.gov and allows taxpayers to generate a PIN that they can use to file tax […]

Pierluigi Paganini February 11, 2016
Million CISCO ASA Firewalls potentially vulnerable to attacks

A flaw in Cisco ASA Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. It’s a bad period for IT manufacturers, recently the security community has discovered serious and anomalous  vulnerabilities affecting popular products like Juniper equipment and Fortinet Forti OS firewalls. Now, it is now the […]

Pierluigi Paganini February 11, 2016
Poseidon Group, a single actor behind a long series of attacks

Experts at Kaspersky Lab have linked a series of cyber attacks started in 2001 to a single threat actor called the Poseidon Group. Experts at Kaspersky Lab have identified a single threat actor behind a long-known campaign of cyberattacks financially motivated. The group of hackers identified by Kaspersky dubbed Poseidon Group attempts to extort money […]

Pierluigi Paganini February 10, 2016
SAP fixed a flaw in xMII that could open the door to nation-state hackers

SAP fixed a vulnerability affecting SAP MII can be used as a starting point of multi-stage attacks aiming to get control over plant devices and manufacturing systems. SAP fixed a critical vulnerability in its application that could be exploited by hackers, especially nation-state actors, to compromise industrial manufacturing software. SAP issued a critical software update that […]

Pierluigi Paganini February 09, 2016
Are you searching for a Facebook Hacking Tool? Be careful!

Security Experts at ESET security firm discovered a new variant of a known trojan disguised as a Facebook Hacking Tool. Security researchers at ESET have published an interesting post about a new Facebook hacking tool. I receive every week dozen emails requesting me instruction to hack Facebook accounts. The hacking tool recently discovered is not […]