Hacking

Pierluigi Paganini August 08, 2016
Nuuo and Netgear video surveillance recorders affected by multiple flaws

The US-CERT warns of the presence of multiple flaws in the Nuuo NVRmini and other network video recorders of the same vendor. The US-CERT has issued a security advisory related to the presence of multiple vulnerabilities in the Web interface of a Netgear ReadyNAS Surveillance video recorder  and various devices manufactured by the video recording company […]

Pierluigi Paganini August 08, 2016
Garda forced to shut down its systems after a malware-based attack

The experts from the Irish Garda are investigating a malware-based attack that forced it to shut down its data systems. No system was breached. The Garda SĂ­ochĂĄna, the national police service of Ireland, was forced to shut down its data systems in response to a malware-based attack. The Ireland’s national police put in place the emergency […]

Pierluigi Paganini August 08, 2016
Hackers could break into billion computers through their monitor

At the DEF CON conference, a group of three researchers from Red Balloon Security has demonstrated how to hack a computer through its monitor. It is a common error consider monitors as a passive device that could not be exploited by attackers to hack our systems. The reality is quite different, attackers could hijack every monitor […]

Pierluigi Paganini August 07, 2016
A flaw in Samsung Pay could be exploited to remotely skim credit cards

The security expert Salvador Mendoza demonstrated that is it easy to steal Samsung Pay tokens and reuse them to make fraudulent purchases. The security researcher Salvador Mendoza has discovered a flaw in the Samsung Pay system that could be exploited by hackers to remotely skim credit cards. The attackers can steal Samsung Pay tokens and […]

Pierluigi Paganini August 07, 2016
Hacker Interviews – CtrlSec

Are you searching for a hacker that attacks ISIS online propaganda every day? CtrlSec is the right person. Enjoy the interview! Did you participate in several hacking campaigns? could you tell me more about you? I actually just had some experience with web design, I decided to start doing something with ISIS when me and a group of other people […]

Pierluigi Paganini August 07, 2016
Car thefts – Two men used a pirated software running on a Laptop to steal more than 100 cars

Huston police identified and arrested 2 men while it was investigating a series of car thefts made using a pirated software running on the thieves’ laptop Two men have stolen more than 100 vehicles by using a laptop running a common software that’s used by technicians and auto dealers. The two criminals, Michael Arce, 24, and […]

Pierluigi Paganini August 06, 2016
Cyberwar – The cyberspace is already a dangerous battlefield

The number of high-profile hacks demonstrates that a silent cyberwar is already ongoing among countries in the cyberspace. The recent hacks of the Democratic National Committee and presidential candidate Hillary Clinton’s campaign and the alleged infections spotted by the Russian FSB inside government networks demonstrate the intense activity in the cyberspace. It is a virtual […]

Pierluigi Paganini August 06, 2016
FireEye Report – 33 percent of ICS Flaws had no vendor fixes when reported

FireEye documented more than 1,500 vulnerabilities affecting ICS disclosed in the past 15 years, and some of them are still present. Security of critical infrastructure is a pillar of the cyber strategy of any government, both the NIS directive and Warsaw NATO summit stressed the importance of a proper security posture to protect our systems from cyber […]

Pierluigi Paganini August 05, 2016
How to withdraw up to $50,000 in cash from an ATM by using data stolen from EMV cards

Researchers have demonstrated how crooks can make ATMs spit out thousands of dollars in cash in just a few minutes by using data stolen from EMV cards. When the EMV (Europay, MasterCard, and Visa) was introduced, the vast majority of security experts believed solved the problems caused by easy to clone magnetic stripe cards. EMV chip-equipped […]

Pierluigi Paganini August 05, 2016
Apple will pay up to $200,000 in Bug Bounty Program

Apple has chosen the Black Hat 2016 security conference to announce the launch of its bug bounty program, hackers can earn up to $200,000 for a flaw. Great news for bug hunters, finally Apple announced that it will pay hackers that will find bugs in its products. Apple is the last IT giant to launch […]