Hacking

Pierluigi Paganini June 02, 2016
Lenovo Accelerator Application contains a bug that allows remote hack of your PC

A study of Duo Security revealed that Lenovo Accelerator Application support tool contains a high-risk flaw that allows remote code execution. Once again bad news for Lenovo users, the company is informing them that the Lenovo Accelerator Application contains a high-risk vulnerability that could be exploited by hackers to remotely execute code on the machine and […]

Pierluigi Paganini June 01, 2016
Windows zero-day offered for sale in a crime forum for $90,000

The researchers from the Trustwave’s Spiderlabs team discovered that a Windows zero-day is available for sale in a popular crime forum for $90,000. A Windows zero-day flaw was offered for sale at US$90,000 on the Russian crime forum exploit.in. The flaw could be exploited by hackers to gain a full deep access to an already compromised […]

Pierluigi Paganini May 31, 2016
Power plant ICS threatened by an easy remotely exploitable flaw

The independent researcher Maxim Rupp reported an unpatchable flaw in the ICS Environmental Systems Corporation (ESC) 8832 Data Controller. Vulnerable SCADA and industrial control systems represent the entry point in critical infrastructure for hacking attacks. In many cases, patch management of these systems is very complex and in some specific scenarios known flaws could not be fixed for various […]

Pierluigi Paganini May 30, 2016
Android 6.0 Marshmallow permission-granting model is under attack

Malware researchers are warning Android’s latest permission-granting model in version 6.0 Marshmallow is now been targeted by Mobile malware authors. Android’s latest permission-granting model in version 6.0 Marshmallow is now been targeted by Mobile malware authors. The model  will let users grant permissions only when it is required by the app, rather be accepting all […]

Pierluigi Paganini May 30, 2016
US-CERT warns MEDHOST medical app contains hard-coded credentials

The US Computer Emergency Response Team has issued a warning after the discovery a security issue the popular medical application MEDHOST PIMS (PIMS). Many security experts believe that medical industry lack of a proper security posture, despite it is a high-tech sector the vast majority of medical equipment was not designed with a security by design […]

Pierluigi Paganini May 30, 2016
Hacker Interviews – Speaking with Mikko Hypponen

Mikko Hypponen does not need any introduction, he is a true star, one of those professionals who have indelibly marked the evolution of the cyber security industry. I consider Mikko a legend, and I’m happy to share with you this interview. Enjoy it!   Hi Mikko, you are a legend of the hacking community, can […]

Pierluigi Paganini May 29, 2016
Why surveillance firm Blue Coat was granted a powerful encryption certificate?

Experts discovered that the Controversial Surveillance firm Blue Coat was granted a powerful encryption certificate that can be used for web monitoring. Once again we are here speaking about surveillance, security experts have discovered that the controversial firm Blue Coat Systems was granted  powerful encryption digital certificates. Blue Coat sells web-monitoring software, its surveillance appliances were […]

Pierluigi Paganini May 29, 2016
Hacking NTP Servers from Long-Distance with low cost devices

A couple of experts demonstrated how to wirelessly change the time on NTP servers over long distances using an inexpensive equipment. The HACK IN THE BOX conference is a hotbed of interesting hacks,  today I will present you the results of a research conducted by the researchers Yuwei Zheng and Haoqi Shan from Qihoo360 firm that explained […]

Pierluigi Paganini May 28, 2016
Hacker Interviews – Claudio Nex Guarnieri

Hacker interview – Today I have the honor to interview Claudio Guarnieri, aka Nex, one of the most talented hackers and security researchers. Claudio is known as one of the most active civil rights advocate, he is known for his researchers at the Citizenlab, he is creator of the @cuckoosandbox and @malwr. Enjoy the interview! Hi Claudio, […]

Pierluigi Paganini May 27, 2016
A fourth bank hit by SWIFT hackers, are they backed by the DPRK

A fourth Bank in Philippines was a victim of the SWIFT hackers and experts at Symantec confirmed the malware shares code with tools used by the Lazarus group. The list of banks victims of the SWIFT hackers is lengthening, a fourth bank in the Philippines has been a victim of the crew that targeted the SWIFT interbank transfer system. […]