Hacking

Pierluigi Paganini June 17, 2016
Guccifer 2.0 – Lone Wolf or a Fancy Bear?

A hacker using the pseudonymous Guccifer 2.0, claimed responsibility for the cyber-attack on the Democratic National Committee (DNC). Yesterday, we blogged about the cyber-attack on the Democratic National Committee (DNC) that led a dossier of the presumptive Republican presidential nominee, Donald Trump. According to the US-based cyber security company CrowdStrike, two sophisticated Russian espionage groups, COZY […]

Pierluigi Paganini June 16, 2016
Cisco wireless kits are affected by a critical bug but no fix is available

A security advisory recently released by CISCO announce that three Cisco wireless kits are affected by a critical bug, but no fix is available at the moment. SOHO devices are among most targeted network components in the wild, they are often poorly protected or not properly configured exposing users to serious risks. In these cases, […]

Pierluigi Paganini June 15, 2016
Hacking Facebook Accounts with just a phone number through the SS7 protocol

Hacking Facebook Accounts with just a phone number is possible, experts from Positive Technologies demonstrated it exploiting flaws in the SS7 protocol. Hacking Facebook accounts by knowing phone numbers it is possible, a group of researchers from Positive Technologies demonstrated it. “Researchers have proven just that by taking control of a Facebook account with only a phone number […]

Pierluigi Paganini June 15, 2016
ScarCruft APT Group exploited Flash Zero-Day in High-Profile attacks

Security experts from Kaspersky Lab revealed that an APT group dubbed ScarCruft exploited the zero day vulnerability (CVE-2016-4171) in Adobe Flash Player. According to the experts from Kaspersky Lab, an APT group dubbed ScarCruft exploited a zero day vulnerability (CVE-2016-4171) in Adobe Flash Player. The group launched a series of attacks against high-profile targets against entities in […]

Pierluigi Paganini June 15, 2016
Over 45 Million passwords from Verticalscope 1,000 sites leaked online

In February Verticalscope platform was hacked and more than 45 Million passwords from  1,000 websites running on it have been leaked online. Data breaches, a never ending saga! Recently we reported a number of clamorous data breaches, hundred thousand million credentials were offered for sale in dark web. LinkedIn, mySpace, VKontakte, and Twitter are some of […]

Pierluigi Paganini June 15, 2016
CVE-2016-4171 – Another Flash Zero-Day exploited in targeted attacks

Adobe states that the Flash Player zero-day vulnerability (CVE-2016-4171) has been exploited in targeted attacks. It will be fixed later this week. Once again Adobe Flash Player is the target of hackers in the wild. Adobe has released security updates for several of its products announcing that the fix for a critical Flash Player zero-day vulnerability […]

Pierluigi Paganini June 14, 2016
Hack the Pentagon, hackers already found more than 100 flaws

Hackers contracted by the DoD under the Hack the Pentagon initiative have found more than 100 vulnerabilities exceeding Government’s expectations. Do you remember the ‘Hack the Pentagon‘ initiative? ‘Hack the Pentagon’ is the initiative launched by the US Government this year to test the resilience to cyber attacks of the US defenses. The Pentagon has launched the […]

Pierluigi Paganini June 14, 2016
Crooks can clone payments cards with a hi-tech contactless device

Cyber criminals are offering for sale a hi-tech gadget named Contactless Infusion X5t to scan nearby contactless payment cards and clone them. The British Daily Mail published an interesting article on a new gadget used by crooks to clone up to 15 contactless bank cards a second from victims, and it can do it by […]

Pierluigi Paganini June 14, 2016
Hackers find a way to send massive messages on Telegram

Security researchers have found a vulnerability that could allow attackers to send massive messages on Telegram bypassing its limitations. Security researchers have devised a method to send massive messages on Telegram. The experts have found a flaw that allows them so send messages of any size as showed in the proof-of-concept provided by the researchers. […]

Pierluigi Paganini June 14, 2016
‘Hacking Team’ and heterogony of ends: how the hack of Phineas Fisher can lead to unwanted worst consequences for the evolution of the Surveillance Tools and State Spyware.

The “heterogony of end” is a famous expression formulated in 1886 by the German philosopher Wihelm Wundt, what about the Hacking Team case? After the hack of the controversial government spying and hacking tool vendor Hacking Team by an outside attacker, a large  numbers of media headlines worldwide reported the events. [1,2,3] The hacker announced […]