Hacking

Pierluigi Paganini November 01, 2015
Hackers have accessed details of 1,827 Vodafone customers

According to Vodafone UK, criminals used the stolen data obtained from “an unknown source” to try to access customers’ accounts. Personal details belonging to roughly 2,000 Vodafone customers have been compromised. According to Vodafone, cyber criminals used the stolen data (emails and passwords) obtained from “an unknown source” to try to access customers’ accounts between […]

Pierluigi Paganini November 01, 2015
How to steal Jaguar XFR cars in 60 seconds by hacking them

Hackers are able to steal Jaguar XFR  cars by exploiting a hacking device that sends out a fake signal emulating a wireless key. According to the CCTV footage, a Jaguar XFR parked in a parking lot in Auckland (New Zealand) was stolen with this technique. The video shows the thief that walks towards the car, opens the door […]

Pierluigi Paganini October 31, 2015
The surveillance firm Hacking Team is back stronger than before

Motherboard has obtained a non-public email sent by the Hacking Team CEO to its customers that announce a new generation of hacking tools. Hacking Team is the popular surveillance company that suffered a serious data breach this year. More than 400 GB of its sensitive data were exfiltrated from the Italian company, including internal emails, zero-day exploits, surveillance […]

Pierluigi Paganini October 31, 2015
Hacking discipline, EOL of computer science in the cyber domain

The hacking world will change. Instead of hacking based on computer programming as today, the hacking will be based on chemistry, biology, and physics. In the medium term future, the hacking world will change. Instead of hacking based on computer programming as today, the hacking will be based on chemistry, biology and physics. This article […]

Pierluigi Paganini October 31, 2015
Anonymous will reveal names of about 1,000 KKK members

“Ku Klux Klan, We never stopped watching you,” “We know who you are.” Anonymous plans to reveal the identities of up to 1,000 Ku Klux Klan members. The popular Anonymous collective has declared war to the white supremacy group Ku Klux Klan (KKK), the hacktivist has posted a video message on YouTube and a message on Twitter to […]

Pierluigi Paganini October 30, 2015
Another Magento Remote Code Execution Vulnerability

The security expert Ebrahim Hegazy has published an interesting post detailing his discovery of a new Magento Remote Code Execution Vulnerability. The popular hacker Ebrahim Hegazy (Aka Zigoo) has discovered a Remote Code Execution Vulnerability that affects the widely adopted application Magento. The experts was analyzing the Magento website whe he discovered the sub-domain http://lavender.dev.magento.com/ supposedly used […]

Pierluigi Paganini October 29, 2015
Shockwave player flaw exposes 450 million users at risk of hack

Adobe has released a critical update to fix a flaw in the Shockwave player that could be exploited to compromise hundreds of millions of machines. Adobe has released a critical update to fix a vulnerability in the Shockwave player (CVE-2015-7649) that could be exploited by threat actors to compromise hundreds of millions of machines. The […]

Pierluigi Paganini October 29, 2015
Iranian Hackers focus their efforts in Android RATs

A research published by RecordedFuture demonstrates that the interest in Android RATs of Iranian Hackers is rising, DroidJack and AndroRAT are most popular. According to the threat researcher Rodrigo Bijou (@rodrigobijou), Iranian malware authors are focusing their efforts on mobile RATs, in particular, malicious codes designed to compromise Android devices. The security experts confirmed that […]

Pierluigi Paganini October 29, 2015
Just $1400 to build an IMSI catcher like device to track phones

A group of researchers demonstrated that it is possible to build a Low-cost IMSI catcher for 4G/LTE networks to track phone locations. IMSI catcher for 4G/LTE networks are very expensive devices that allow tracking phone locations. Now a group of researchers has found a way to track devices using the latest LTE standard for mobile networks, but with a very […]

Pierluigi Paganini October 28, 2015
The US DoD still uses SHA-1 signed certificates for use by military agencies

The United States Department of Defense is still issuing SHA-1 signed certificates for its military agencies, despite they are considered insecure. Today I have published a blog post on the Army Vulnerability Response Program (AVRP), a sort of bug bounty program specific for the US military environment. The idea is to incentive  the ethical disclosure of vulnerabilities […]