Pierluigi Paganini June 27, 2015
Magento payment card stealers are being used in the wild

The security researchers at Sucuri firm discovered a malicious code that could be used to steal payment card data from Magento platform. Security experts at Sucuri have uncovered a new method used by criminals to syphon payment card data from websites based on the Magento e-commerce Platform. Researchers explained that attackers can collect any data submitted […]

Pierluigi Paganini June 26, 2015
Cisco Security Appliances contain a default SSH Key

Security experts at Cisco revealed the existence of a default SSH key in many security appliances, an attacker can exploit it to control the devices. Security experts at Cisco discovered default SSH Key in many Cisco security appliances, an attacker could use them to establish SSH connection and control the devices. The abuse of the […]

Pierluigi Paganini June 24, 2015
ScryptCC hacked, large amount of Bitcoin stolen. DO NOT DEPOSIT!

Altcoin cloud mining hash power online marketplace ScryptCC has been hacked and a large amount of Bitcoin was stolen by the attacker. The news of another clamorous case of Bitcoin theft is circulating on the Internet, Altcoin cloud mining hash power online marketplace ScryptCC has been hacked. In time I’m writing it is not known […]

Pierluigi Paganini June 24, 2015
Google accused, Chromium eavesdropping tool installed on computers without permission

Privacy advocates claim snooping component was activated within Chromium, potentially exposing private conversations. Privacy advocates are accusing Google. Privacy advocates and open source developers claim over the secret installing of Google software which is capable of listening in on conversations held in the surrounding environment. It seems that the listening component was involuntarily activated within […]

Pierluigi Paganini June 23, 2015
Adobe fixed the CVE-2015-3113 that is being exploited in the wild

Adobe has released a security update for the critical Adobe Flash Player vulnerability CVE-2015-3113 that is being actively exploited in the wild. Security experts at FireEye discovered a critical heap buffer overflow vulnerability, coded CVE-2015-3113, that affects Adobe systems. FireEye discovered that the Adobe flaw is being exploited in the wild by the hacking crew […]

Pierluigi Paganini June 23, 2015
Microsoft will not patch an IE exploit affecting million 32bit systems

Security expert Dustin Childs publicly disclosed a Microsoft IE exploit that affects only 32-bit IE platforms which are currently used by millions of users. The HP security expert Dustin Childs publicly disclosed a Microsoft IE exploit based on a flaw that resides in the Address Space Layout Randomisation (ASLR). The ASLR is a security feature implemented […]

Pierluigi Paganini June 23, 2015
Disclosed new information about Tor sites

A security researcher is trying to harvest information about Tor sites that propose illegal products, and in some cases he even discovered their address. The Dark Web is known to be “the place” for sites where it can be found drugs, child pornography, weapons, because these websites can live on without disclosing the server location […]

Pierluigi Paganini June 23, 2015
NSA and GCHQ target security firm including Kaspersky

Documents leaked by Edward Snowden show the NSA and the GCHQ efforts to compromise security software companies including Kaspersky Lab.  A new collection of documents leaked by the popular whistleblower Edward Snowden reveals that both UK and US government intelligence agencies are targeting principal security firms and security companies. Kaspersky Lab calls nation-states’ targeting of security companies […]

Pierluigi Paganini June 22, 2015
Kevin Mitnick explains how to hack fiber optic and steal sensitive data

The popular hacker Kevin Mitnick explains how it is easy to steal data from a network tapping the cable, even if it’s a fiber optic network. Kevin Mitnick demonstrates how easy it is for a hacker to tap into your network and read your email messages, even if it’s a fiber optic network. Kevin Mitnick […]

Pierluigi Paganini June 22, 2015
Hackers targeted the Polish Airline LOT, grounded 1,400 Passengers

A cyber attack against the ground computer systems of the Polish flagship carrier LOT grounded more than 1,400 passengers at Warsaw’s Okecie airport. The Polish national airline, LOT, announced on Sunday that it has cancelled 10 flights due to a cyber attack against the airline’s ground computer systems at Warsaw’s Okecie airport. “Today afternoon LOT […]