Hacking

Pierluigi Paganini August 12, 2015
Attackers exploit a Windows flaw using a booby-trapped USB

Microsoft announced in the Tuesday’s bulletin that crooks have been exploiting a vulnerability that allows to execute malicious code using booby-trapped USB Microsoft announced in the last Tuesday’s bulletin that crooks have been exploiting a vulnerability that allows to execute malicious code using booby-trapped USB. The vulnerability affects all supported versions of Windows OS as […]

Pierluigi Paganini August 12, 2015
Facebook API flaw Left 1.44 Billion Users’ Identities at risk

A security flaw in the Facebook API allows hackers to decrypt and scan user IDs, nearly 1.44 billion Facebook users are at risk of identity theft. The security researcher Reza Moaiandin, Technical Director at Salt Agency, discovered a flaw in Facebook’s API that can allow hackers to scan for user ID, and that leaves about […]

Pierluigi Paganini August 12, 2015
Darkhotel APT group relied also on Hacking Team’s exploits

Kaspersky revealed provided an update of the report on the Darkhotel APT that targets executives traveling across Asia through hotel internet networks. In November 2014, Kaspersky Lab published a report on the activities of the Darkhotel APT group. Security experts at Kaspersky Lab uncovered the Darkhotel espionage campaign, which is ongoing for at least four years while targeting selected […]

Pierluigi Paganini August 12, 2015
Chinese Hackers still have access to email of Top US Officials

A senior U.S. intelligence official revealed that Chinese hackers have accessed the private emails of “many” top Obama administration officials. According to an official of the US intelligence, Chinese hackers have accessed the private emails of “many” top members of the Obama administration. The news was reported by the NBC News which obtained a top […]

Pierluigi Paganini August 11, 2015
0-Day Deserialization flaw impacts more than 55 percent Android users

Security Experts at IBM have discovered a new critical vulnerability affecting Android OS and impacting more than 55 percent users. There is no peace for the Android users, recently experts discovered the critical Stagefright vulnerability and other serious flaws like the Certifi-gate vulnerability and CVE-2015-3823 flaw. Now experts from IBM have discovered another critical bug in the Google Android OS that impacts more […]

Pierluigi Paganini August 11, 2015
Aerial Assault Drone, the new Hacking Weapon presented at the Defcon

A new hacking machine is available in the arsenal of hackers it is an Aerial Assault drone that is able to automatically crack into wireless networks. David Jordan of US-based Aerial Assault presented was the Def Con conference an assault drone equipped with hacking tools. The vehicle could be used in hacking missions, for example by […]

Pierluigi Paganini August 11, 2015
Internal modem can be exploited by malware to gain persistence

Two security experts at the last Def Con hacking conference have demonstrated how Internal LTE/3G modems can be hacked to help malware survive OS reinstalls Many users totally ignore that LTE/3G modems built into new business laptops and tablets have a dedicated processor and operating system that could be exploited by threat actors to maintain persistent […]

Pierluigi Paganini August 10, 2015
Certifi-Gate, a new Android flaw allows hackers to control your mobile

Certifi-Gate is the name of a new vulnerability affecting Android mobile devices discovered by Check Point security that could be exploited to control them. Android users had a bad time after discovering the “Stagefright” vulnerability, but unfortunately other security issues are warning them. It was recently discovered a new vulnerability dubbed Certifi-Gate which could be […]

Pierluigi Paganini August 10, 2015
Hacking airport security systems with a common laptop

Hackers can compromise airport security networks by using a common laptop, this is the disconcerting discovery of the popular expert Billy Rios. Cyber security from I-Team investigation revealed that hackers could have the ability to shut down an airport’s security network just using a laptop. It is embarrassing read that system designed to improve security of the […]

Pierluigi Paganini August 10, 2015
Hackers can remotely steal fingerprints from Android devices

Researchers from FireEye have revealed that it is possible to attack Android smartphone to remotely steal user’s fingerprints on a “large scale.” Security experts have often expressed concerns regarding the fingerprint management implemented by the principal mobile vendors. Hackers have demonstrated that it is not difficult to trigger vulnerabilities inside systems that manage fingerprints in […]