Hacking

Pierluigi Paganini July 14, 2016
Shard discovers shared passwords between most popular web services

Shard is a free tool that could be used by hackers to discover shared passwords between most popular web services, including Facebook, LinkedIn, Reddit, Twitter, or Instagram. In the past months, we have read about numerous data breaches, LinkedIn, MySpace, VerticalScope are just a few examples of illustrious victims. Hundreds of thousands of millions of credentials have flooded the […]

Pierluigi Paganini July 14, 2016
xDedic Marketplace for hacked servers reappeared on Tor

Following a short disappearance, the xDedic market – the infamous ‘eBay’ of hacked servers, has made a new appearance on the Tor network. The xDedic market is still offering everyone from entry-level cybercriminals to APT groups fast, cheap and easy access to legitimate organizational servers. The domain (xdedic[.]biz) went offline following a report from Kaspersky […]

Pierluigi Paganini July 14, 2016
Millions of Xiaomi Smartphone vulnerable to remote hacking

Millions of Xiaomi smartphone are affected by a critical remote code execution flaw that could be exploited by hackers to take over the mobile devices. Millions of Xiaomi mobile are vulnerable to remote hacking due to a critical remote code execution (RCE) vulnerability that could be exploited by hackers to take over the mobile devices. The […]

Pierluigi Paganini July 14, 2016
CVE-2016-3238 Windows flaw allows to hack companies via printers

Microsoft has just fixed a the CVE-2016-3238 Print Spooler vulnerability that allows attackers to hack any version of Microsoft Windows. The July Microsoft Patch Tuesday includes security bulletins that address 50 security holes. Six security bulletins are rated critical, reading the them one advisory will catch the attention of the reader. Microsoft has fixed a security […]

Pierluigi Paganini July 13, 2016
Hacker Interviews – Chema Alonso

Enjoy the interview with Chema Alonso (@chemaalonso), Chief Digital Officer at Telefonica, who is one of the most talented cyber security experts. Chema Alonso is currently Chief Digital Officer at Telefonica, he is one of the most talented cyber security experts, a skilled hacker that is considered a star of the IT security industry. Enjoy the […]

Pierluigi Paganini July 13, 2016
Experts found a government malware on the Dark Web

Experts have made a disconcerting discovery on the Dark Web, they have found a sophisticated government malware that could be used to target Energy Grids. We have discussed several times about the militarization of the cyberspace and the risks that a government malware goes out of control, what about is a powerful hacking tool is […]

Pierluigi Paganini July 12, 2016
Hacker Interviews – John McAfee, the legend

Dear readers, I’m really proud and excited to share with you my interview with a legend Mr John McAfee. John McAfee is one of the spiritual father of modern cyber security, he developed the first commercial antivirus, but John is much more. He is the “artist” of security, a modern juggler of technology. Multi-talented and […]

Pierluigi Paganini July 11, 2016
Be careful backdoored Pokemon GO Android App spotted in the wild

ProofPoint have found in the wild a backdoored version of the popular Pokemon GO Android App that could allow attackers to gain control over victim’s device The gamers are going crazy for the last Nintendo game Pokemon GO which uses augmented reality , the mobile app is used by players to walk around and collect […]

Pierluigi Paganini July 11, 2016
Netia SA, the second telecom company hacked by a Ukrainian hacker

A Ukrainian Hacker has breached the servers of the Polish Telecom Company Netia SA and leaked on an underground forum the stolen data. A Ukrainian hacker going by the pseudonym of Pravy Sektor has hacked the servers of Poland’s telecom company Netia SA, the second largest telecom company in the country. The hackers stole personal details […]

Pierluigi Paganini July 10, 2016
Hacking mobile via hidden voice commands embedded in YouTube videos

A group of researchers has devised a new method for hacking mobile devices by using hidden voice commands in YouTube videos. A group of researchers from the University of California, Berkeley, and Georgetown University has devised a method for hacking mobile devices by using hidden voice commands embedded in YouTube videos. In order to hack […]