Hacking

Pierluigi Paganini October 05, 2015
How to Hack and Decrypt WhatsApp Database on rooted devices

The post includes a detailed procedure to hack and decrypt WhatsApp Database remotely on rooted Android mobile devices. Very Interesting! A few hours ago it has been published an interesting post on “How to Hack and Decrypt WhatsApp Database (Remotely) [ROOT]” that explains how to extract and decrypt WhatsApp database from a rooted Android system. […]

Pierluigi Paganini October 05, 2015
Fareit malware avoids detection using a different file hash for each attack

Security experts at Cisco Talos have discovered a new strain of the Fareit Info stealer that uses a different File hash for each attack to avoid AV Detection Security experts at the Cisco Talos team have detected a new strain of the Fareit malware. Fareit is an info stealer that has been around since 2012, it is […]

Pierluigi Paganini October 04, 2015
Hacking drones by exploiting design flaws

At the Virus Bulletin 2015 conference, the security researcher Oleg Petrovsky detailed methods that can be used to hack drones with pre-programmed routes. The drone industry is growing at a rapid pace, the aerospace research company Teal Group estimated that sales of military and civilian drones will total over $89 billion in the next 10 […]

Pierluigi Paganini October 03, 2015
US state police cars are vulnerable to cyberattack

Virginia State Police (VSP) launched a project to test the resilience to cyber attacks of police cars (models 2012 Chevrolet Impalas and 2013 Ford Tauruses) A couple of months ago the security researchers Charlie Miller and Chris Valasek demonstrated how to remotely hack a connected, we the news that cars sued by the US state police […]

Pierluigi Paganini October 03, 2015
Scottrade data breach affects 4.6 Million Customers

Online stock brokerage Scottrade has suffered a major data breach that exposed the personal information of 4.6 million customers. Data breach news are making the headlines, while I’m writing about the hack of the crowdfunding website Patreon and the hack of Experian, the news of a data breach suffered by the online stock brokerage Scottrade is […]

Pierluigi Paganini October 03, 2015
Patreon crowdfunding site hacked and data leaked online

The Crowdfunding website Patreon has been hacked and about 15 gigabytes of data including names, addresses and donations have been published online. The data have been available on different servers online locations, including this source. The Patreon website collects donations to artists for projects, according to the information provided by the chief executive Jack Conte, credit card […]

Pierluigi Paganini October 02, 2015
Experian’s data breach puts 15 million T-Mobile users at risk

Experian’s data breach puts 15 million T-Mobile users’ personal information at risk- The company already started the incident response procedure. T-Mobile has announced that data belonging to 15 million consumers may have compromised in a cyber attack that the company has suffered. The hackers targeted the Experian company which processes some of T-Mobile’s credit applications accessing customers personal data. “We have been notified […]

Pierluigi Paganini October 02, 2015
A billion Android devices vulnerable to Stagefright 2.0 bugs

A billion Android phones are vulnerable to Stagefright 2.0 flaws that could be exploited by attackers to execute malicious code on the targeted device. Do you remember the Stagefright vulnerability? In July 2015,  security experts from Zimperium discovered the Stagefright flaw in the popular Google Android OS which allows hackers to gain control of the system without raising […]

Pierluigi Paganini October 02, 2015
The mystery behind the Internet-of-Things vigilante malware

A new strain of malware identified by Symantec as the Vigilante malware, aka Wifatch, has infected tens of thousands of IoT devices across the world. Who is infecting thousands of IoT devices across the world, and why? A new strain of malware, identified by Symantec as Linux.Wifatch has infected tens of thousands of IoT devices across the […]

Pierluigi Paganini October 01, 2015
New Apple Gatekeeper bypass can allow running rouge applications

Patrick Wardle, director of research at Synack has already demonstrated another method, called Apple dylib hijacking, to bypass Apple GateKeeper. Since the introduction of the Apple Gatekeeper by MAC OSX, many researchers have focused their attention in trying to find flaws affecting it due to bypass Apple security and gain control of a device. Patrick […]