Hacking

Pierluigi Paganini August 23, 2015
Who are the Ashley Madison users?

The hackers behind that data breach of the Ashley Madison website have released another dump of 20 GB and experts are publishing their analysis on it. The recent hack of the adultery website Ashley Madison is attracting the attention of the media, after the disclosure of a second dump of data the security experts started their […]

Pierluigi Paganini August 22, 2015
BMW was aware of the flaw exploited by the OwnStar Hack

A security researcher revealed that BMW was aware of the mobile app vulnerability that allows hackers to run the Ownstar attack. At the recent DEF CON conference the popular security researcher Samy Kamkar presented Ownstar, a $100 gadget that allows to hacks GM Cars. The Ownstar tool allows to locate, unlock, and start a car who […]

Pierluigi Paganini August 21, 2015
Apple users are vulnerable to sandbox vulnerability

Experts discovered that the sandbox vulnerability affects all apps that use the managed app configuration setting in devices that run older versions. Kevin Watkins, a security researcher from Appthority, argues that users without iOS 8.4.1 are affected by the sandbox vulnerability, CVE-2015-3269. The flaw affects all apps that use the managed app configuration settings, meaning that […]

Pierluigi Paganini August 20, 2015
Rent a luxury car and crack its transponder to steal it later

Researchers Roel Verdult and Baris Ege, revealed that popular cars, including Ferrari and Porsche,which use Megamos Crypto transponders can be easily stolen. The level of interest on Car hacking is maximum following the recent hack of the Fiat Chrysler Jeep, news of the day is that a team or experts since 2012 is aware of the presence of security flaws […]

Pierluigi Paganini August 19, 2015
Chip-and-PIN technology has been compromised

A new report published by the popular investigator Brian Krebs show how cyber criminals have compromised chip-and-PIN technology. Recently chip-and-PIN technology started to be adopted in the US because it would improve the security for the customers, merchants and financial institutions. This is true, but the problem is that when the market pushes in one […]

Pierluigi Paganini August 19, 2015
CVE-2015-3842 – A new critical flaw threatens Android users

CVE-2015-3842 is a new flaw affecting the Android mediaserver, which can be exploited to perform attacks involving arbitrary code execution. The problems for Android users continue, a long serie of vulnerabilities has been discovered by the experts in the last weeks, Stagefright, zero-day zero-day deserialization, and Certifi-Gate are the names of some of the flaw recently […]

Pierluigi Paganini August 18, 2015
ICS-CERT warns for 0-Day vulnerabilities in SCADA systems

The ICS-CERT has recently published six security advisories to warn organizations about a number of 0-day flaws in SCADA systems. The ICS-CERT has published six advisories to warn organizations about the presence of Zero-Day Flaws in SCADA Systems. Aditya K. Sood, security researcher at Elastica, has revealed in a talk at the Def Con 2015 conference several vulnerabilities […]

Pierluigi Paganini August 18, 2015
SS7 flaw allows hackers to spy on every conversation

By Exploiting a flaw in the SS7 protocol hackers can access every conversation and text message mobile users send from everywhere in the world. Hackers can spy on every mobile phone user wherever it is. Channel Nine’s 60 Minutes has revealed the existence of a security hole in modern telecommunication systems that could be exploited by […]

Pierluigi Paganini August 17, 2015
An Italian expert discovered two zero-day flaws in MAC OS X

An Italian security researcher has discovered two zero-day vulnerabilities in Apple MAC OS X that could be exploited to gain remote access to a PC. An Italian teenager, Luca Todesco, has found a couple of critical zero-day vulnerabilities in Apple OS X operating system that could be exploited to gain remote access to a PC. The […]

Pierluigi Paganini August 17, 2015
Antivirus industry damaged by the Kaspersky’case

Kaspersky sustains the Reuters’s story on Antivirus false positives is based on information provided by anonymous former KL employees which are not reliable Some days ago, Reuters published a story about Kaspersky revealing that the Russian company was creating malicious codes to give them an upper hand against their direct competitors. Eugene Kaspersky in the […]