Hacking

Pierluigi Paganini September 18, 2015
The Differences between Targeted Attacks and Advanced Persistent Threats

Although Advanced Persistent Threats and Targeted Attacks are often confused, in their core these are two different things in the field of online security. Most businesses out there need only worry about one of these two types of attacks, focusing their efforts to remain thoroughly protected against both enemies and threats. Many people get confused over […]

Pierluigi Paganini September 17, 2015
A dangerous silent AirDrop attack is threatening Apple users

A new evil vulnerability affecting the AirDrop service could be exploited by attackers to silently infect iPhones and Apple Macs. Versions prior to the latest Apple OS version, the newborn iOS 9, are affected by a serious AirDrop Bug. The AirDrop Bug could be exploited by hackers to take full control of Apple iPhone or Mac machines. […]

Pierluigi Paganini September 16, 2015
Unlock Android 5.x devices is very easy

The security researcher John Gordon has found an easy way to unlock smartphones running Android 5.0 and 5.1 (Build LMY48M). The security researcher John Gordon has discovered a very simple way to bypass the mobile lock feature implemented on smartphones running Android 5.0 and 5.1 (Build LMY48M). Mechanisms like Password lock, Pattern lock and PIN lock […]

Pierluigi Paganini September 15, 2015
SYNful_Knock malicious ROMMON images discovered in the wild

Mandiant firm has spotted more than a dozen Cisco routers running malicious ROMMON firmware images that allow attackers to control targeted devices. A few weeks ago, CISCO issued an alert to warn enterprise customers about a spike in attacks in which hackers use valid admin credentials on IOS devices to install bogus ROMMON images, which is the bootstrap […]

Pierluigi Paganini September 15, 2015
FBI warns customers, get Internet of Things away from the Internet

A recent announcement issued by the Federal Bureau of Investigation warns customers that Internet of Things poses opportunities for cyber crime. The FBI is worried by rapid diffusion of the Internet of Things devices, according law enforcement smart objects could represent a serious threat for cyber security, and more in general for the society. Security […]

Pierluigi Paganini September 15, 2015
Crooks are abusing Google Search Console to remain under the radar

Experts at Sucuri revealed that cybercriminals are abusing Google Search Console to hide their presence in compromised websites, administrators are advised! Security experts at Sucuri firm have discovered cyber criminals are increasingly abusing legitimate webmaster tools (Google Search Console) for black hat SEO and hide their presence on compromised websites. The operation for crooks is […]

Pierluigi Paganini September 14, 2015
The VxWorks OS running also on the Curiosity Rover is flawed

A security expert discovered a critical flaw in the VxWorks, one of the most reliable real-time operating systems for the IoT also used by the Curiosity Rover. The Canadian security researcher Yannick Formaggio has discovered an important flaw in VxWorks which is the real-time operating system (RTOS) developed by the Wind River, an Intel’s subsidiary. VxWorks is one […]

Pierluigi Paganini September 14, 2015
Department of Energy hacked 159 times between 2010 and 2014

According to a review of federal records obtained by USA Today, the US Department of Energy is among the most targeted government organizations in the US. The US Department of Energy manages information of strategic importance for a potential attacker, it oversees the operations of power grid, nuclear arsenal, and national labs. The data show that the […]

Pierluigi Paganini September 14, 2015
Are you using a smartwatch? Hackers could get your data

Researchers have created an app that follows the micro-movements of your smartwatch and are able to detect what keys you’re pressing with your left hand and thus guess what words you may be typing on a keyboard. A group of students lead by Romit Roy Choudhury, Associate Professor at ECE Illinois developed a mobile app […]

Pierluigi Paganini September 12, 2015
ISIS hackers violated top secret British Government emails

According to an investigation by the GCHQ intelligence agency ISIS hackers targeted information held by some of David Cameron’s most senior ministers. According the experts at the British Intelligence GCHQ, ISIS hackers intercept top secret British Government emails. The investigation conducted by the GCHQ allowed the British intelligence to uncover a serious breach, terrorists linked […]