Hacking

Pierluigi Paganini July 18, 2016
Android.Fakebank.B inhibits outgoing calls to bank customer services

Security researchers from Symantec have discovered a new variant of the Android.Fakebank.B banking trojan that prevents users from calling banks. Security experts from Symantec have spotted a new strain of mobile Trojan dubbed Android.Fakebank.B that prevents users from making outgoing calls to banks from their mobile devices. Android.Fakebank.B was first spotted in October 2013, it was able to […]

Pierluigi Paganini July 17, 2016
Hacker Interviews – Mr Xer

Today, thanks to the support of Sneaker, I have interviewed the hacker that goes online with the pseudonym of Mr Xer . I’m continuing to interview hackers that try to destroy the online propaganda of the Islamic State, people that are involved in a silent battle that many people still ignore. Today I’ll present you […]

Pierluigi Paganini July 17, 2016
Hackers used malware to steal $2 million from ATMs in Taiwan

Taiwanese law enforcement agencies are investigating malware-based attacks against ATMs of a national bank that resulted in a $2 million theft. Law enforcement in Taiwan investigating the attacks against ATMs of a major nations bank, the Taiwan’s First Bank. Crooks used a malware to withdraw more than $2 million from dozens of ATMs in the country, it […]

Pierluigi Paganini July 17, 2016
Riffle network will be more secure and performing than Tor

A group of researchers has developed Riffle, a new anonymity scheme that provides better security and performance than others, including Tor. Tor is probably the most popular anonymizing network, million of users leveraged on it to protect their privacy and online anonymity. Now Massachusetts Institute of Technology researchers revealed a new anonymity architecture that could rival Tor. […]

Pierluigi Paganini July 16, 2016
Hacker Interviews – WauchulaGhost, a Ghost that hacks for our children

Enjoy the interview with WauchulaGhost (@wauchulaghost), one of the most active hackers in the fight against the IS online. Military, law enforcement, and hackers have the same the same goal, disrupt the propaganda activities managed by the Islamic State and interfere with IS daily functions, like paying its fighters. There is a silent cyber army of […]

Pierluigi Paganini July 16, 2016
Ubuntu online forums hacked again by exploiting a known SQLi

The Ubuntu online forums have been hacked and the username, IP address, and email address of over two million users have been exposed. The Ubuntu online forums have been hacked for the second time in a few months and data of more than 2 Million users have been exposed. According to Ubuntu, the hackers exposed […]

Pierluigi Paganini July 15, 2016
US sentences Chinese hacker for stealing aerospace secrets

US sentences the Chinese hacker involved in the theft of industrial secrets on the F-22 and F-35 fighter jets, C-17 transport aircraft and F-35 aircraft. The Chinese national Su Bin (also known as Stephen Su and Stephen Subin), 50, has been sentenced to 46 months jail for intellectual property theft. The Chinese hacker admitted having […]

Pierluigi Paganini July 14, 2016
Shard discovers shared passwords between most popular web services

Shard is a free tool that could be used by hackers to discover shared passwords between most popular web services, including Facebook, LinkedIn, Reddit, Twitter, or Instagram. In the past months, we have read about numerous data breaches, LinkedIn, MySpace, VerticalScope are just a few examples of illustrious victims. Hundreds of thousands of millions of credentials have flooded the […]

Pierluigi Paganini July 14, 2016
xDedic Marketplace for hacked servers reappeared on Tor

Following a short disappearance, the xDedic market – the infamous ‘eBay’ of hacked servers, has made a new appearance on the Tor network. The xDedic market is still offering everyone from entry-level cybercriminals to APT groups fast, cheap and easy access to legitimate organizational servers. The domain (xdedic[.]biz) went offline following a report from Kaspersky […]

Pierluigi Paganini July 14, 2016
Millions of Xiaomi Smartphone vulnerable to remote hacking

Millions of Xiaomi smartphone are affected by a critical remote code execution flaw that could be exploited by hackers to take over the mobile devices. Millions of Xiaomi mobile are vulnerable to remote hacking due to a critical remote code execution (RCE) vulnerability that could be exploited by hackers to take over the mobile devices. The […]