Hacking

Pierluigi Paganini November 17, 2015
A flaw in D-Link Switches opens corporate networks to hack

A flaw in certain D-Link switches can be exploited by remote attackers to access configuration data and hack corporate networks. The independent security researcher Varang Amin and the chief architect at Elastica’s Cloud Threat Labs Aditya Sood have discovered a vulnerability in the D-Link Switches belonging to the DGS-1210 Series Gigabit Smart Switches. The security experts revealed […]

Pierluigi Paganini November 17, 2015
Stop DDoS attacks in seconds

An Israeli company named “L7 Defense” is trying to do the impossible – to stop application layer DDoS attacks in seconds instead of hours. It wants to do so by using an automatic protection system based on an immune-biological model that combines with Real Time Big Data analysis. “The body knows how to deal in […]

Pierluigi Paganini November 17, 2015
Windows Bitlocker disk encryption could be easily bypassed

Microsoft recently fixed the a vulnerability in the Bitlocker disk encryption feature that could be exploited to easily bypassed it is a few seconds. A disk encryption tool is a very important software for the protection of our data, million machines rely on them to protect user data, but we have to consider that also […]

Pierluigi Paganini November 15, 2015
Anonymous announced #OpParis against the ISIS in response to the Paris attacks

Anonymous launched the #OpParis to track terrorists online. We are Anonymous. We are Legion. We do not forget. We do not forgive. Expect us! Last Friday was a sad day for the humanity, 129 innocent people were killed in the Paris attacks managed by members of the ISIS. Every event has consequences in the cyber […]

Pierluigi Paganini November 14, 2015
Flaw in the Android Gmail app opens to email spoofing attacks

A security loophole in the official Gmail Android app opens the email spoofing attacks allowing anyone to change the sender email name. The independent security researcher Yan Zhu has discovered a serious security issue in the Gmail Android app allows ill-intentioned to send an email pretending to be someone else. Clearly a similar loophole could represent a […]

Pierluigi Paganini November 14, 2015
Chrome exploit leaves million Android devices open to attack

At the MobilePwn2Own, a Chinese expert has demonstrated how to hijack an Android smartphone by exploiting a zero-day flaw in the Chrome browser. The Chinese expert Guang Gong from Qihoo 360 has demonstrated how to hijack an Android smartphone by exploiting a flaw in the Chrome browser. The researcher demonstrated the hack at the MobilePwn2Own at the […]

Pierluigi Paganini November 13, 2015
The Website of the Norwich airport hacked, a cue to reflect

A hacker shut down the website of the Norwich airport in just a few minutes to demonstrate the importance of a proper approach to the cyber security. A few days ago the website of the Norwich Airport was shut down by a hacker managed, the attack was conducted in a few minutes revealing serious problems of […]

Pierluigi Paganini November 12, 2015
Snooping Samsung S6 calls with bogus base stations

A duo of security researchers, Daniel Komaromy of San Francisco and Nico Golde of Berlin, demonstrated how to intercept calls using bogus base stations. PacSec Modern Samsung devices, including the last generation Samsung S6, S6 Edge and Note 4, are vulnerable to phone eavesdropping. A duo of experts, Daniel Komaromy of San Francisco and Nico […]

Pierluigi Paganini November 12, 2015
Did FBI pay the Carnegie Mellon to hack Tor?

The Director of the Tor Project Roger Dingledine has accused the FBI of commissioning to the Carnegie Mellon boffins a study on methods to de-anonymize Tor users. The experts at the Tor Project have collected more information about the attack launched last year by Carnegie Mellon researchers on the popular anonymizing system. The Director of the […]

Pierluigi Paganini November 11, 2015
88 percent of company networks vulnerable to privileged account hacks

A research published by CyberArk Labs focuses on targeted attacks against organizational networks, analyzing hackers’ methods, tools and techniques. Bad news for network administrators, according to the security company CyberArk, 88 percent of networks are susceptible to privileged account hacks. The report published by CyberArk entitled “Analyzing Real-World Exposure to Windows Credential Theft Attacks” reveals that corporate […]