Hacking

Pierluigi Paganini July 24, 2016
Akamai Threat Advisory – Evolution of DDoS attacks

According to the US-based Akamai Technologies Distributed Denial Of Service (DDoS) attacks have a great level of sophistication today. The Morris Worm of 1989 caused massive damage and losses with its unintentionally caused Denial Of Service (DoS) attacks. Fast forward to today, attacks have sharpened teeth targeting almost every IT service, from telco to gaming firms. […]

Pierluigi Paganini July 24, 2016
Hacking Pokemon Go to reveal characters all around you

A group of hackers has devised a method to hack Pokemon Go to and reveal the exact location of characters all around you. Pokemon Go is the game of the moment, its viral and the attention of the media is very high on the gaming novelty. As the players know, they haven’t the precise location of nearby Pokemon […]

Pierluigi Paganini July 23, 2016
Is the Infocube firm tied to the Carbanak cybercrime gang?

The security expert Brian Krebs investigated the links between the Carbanak cybercrime gang and the Infocube security firm. Today I want to share with you the findings of an investigation of the popular cyber security expert Brian Krebs. This time, Krebs investigated the link between a cybercrime gang and a security firm. The security company […]

Pierluigi Paganini July 23, 2016
Hacker Interviews – Scrub

Let’s continue the series of interviews with talented hackers some of them like Scrub are involved in anti-ISIS campaigns. Scrub is a member of #GhostSquadHackers and currently involved in the #opTurkey campaign. Enjoy the Interview. You are a popular talented hacker that has already participated in several hacking campaigns, could you tell me more about. I started off […]

Pierluigi Paganini July 23, 2016
Cyber Security: Red Team, Blue Team and Purple Team

In military jargon, the term Red Team is traditionally used to identify highly skilled and organized groups acting as fictitious rivals and/or enemies to the “regular” forces, the Blue Team. Whenever we discuss Information Security from a defensive point of view, we are inclined to think about protection, damage control, and reaction. However, adopting an […]

Pierluigi Paganini July 22, 2016
Snowden and Bunnies devised the Introspection Engine to avoid surveillance

The NSA whistleblower Edward Snowden and the popular hacker Andrew “Bunnie” Huang designed Introspection Engine, an interesting anti-surveillance device. While the number of mobile devices is outclassing the number of desktop ones, the concern about the surveillance activities conducted by governments is growing as never before also thanks the Snowden revelations. Mobile devices, often unprotected, […]

Pierluigi Paganini July 22, 2016
Hacker Interviews – The r00t

Today I have interviewed The r00t, a young and skilled hacktivist that participated in many hacking campaigns online, he is a former Lulzsec volunteer. He assumed the name r00t recently, he was known with a different pseudonymous online, but he preferred to remain anonymous. The interview is very interesting, enjoy it! Hi, you are a young talented […]

Pierluigi Paganini July 22, 2016
3D printing of a dead man’s fingers allows unlocking his phone

The US federal authorities asked a 3D printing lab to recreate a dead man’s fingers to unlock his smartphone … will it work? Do you remember the battle Apple vs FBI conducted to force the IT giant on unlocking the San Bernardino Shooter’s iPhone, well it has become a story of the past. The federal authorities […]

Pierluigi Paganini July 22, 2016
Many enterprise apps affected by flaws in Oracle OIT libraries

18 out of 276 vulnerabilities fixed by Oracle with the last Patch Update resides in the OIT libraries that are used by products of numerous major vendors. The last critical Patch Update released by Oracle this week is in the headlines for the number of patches it includes. It includes the fixes for 276 vulnerabilities, 19 of […]

Pierluigi Paganini July 21, 2016
Erdogan Emails: WikiLeaks blocked in Turkey after the release of 300K government emails

The Turkish Government blocked the access to WikiLeaks after release of the Erdogan emails, 300,000 government emails date 2010 to July this year. Cyberspace and the real world are even more interdependent, the observation of the events in both environments is an essential activity for the analysts to predict evolutionary scenarios. The world is attending events […]