Hacking

Pierluigi Paganini March 07, 2016
Coping a 3D Model by recording the sounds of a 3D Printer with a smartphone

The sounds of a 3D printer at work can be analyzed by researchers to reconstruct the original 3D model used to create the object. It isn’t a sci-fi movie but a true experiment conducted by the researchers at the University of California Irvine, led by Mohammad Al Faruque, that demonstrated how to steal 3D-Printed models by copying sounds of […]

Pierluigi Paganini March 06, 2016
Operation Transparent Tribe targets Indian diplomats and military

ProofPoint uncovered a new cyber espionage campaign dubbed Operation Transparent Tribe targeting Indian diplomatic and military entities. A new cyber espionage campaign dubbed Operation Transparent Tribe is targeting diplomats and military personnel in India. The researchers at Proofpoint who have uncovered the hacking campaign confirmed that threat actors used a number of hacking techniques to hit the […]

Pierluigi Paganini March 06, 2016
Anonymous hacked the Donald Trump ‘s voicemails

Journalist at Gawker received an email by alleged members of Anonymous containing recordings from Donald Trump ‘s voicemail inbox. The Anonymous hacking collective continues its personal battle against Donald Trump, this time hacking the voicemail of the presidential candidate. On Thursday, Gawker received an anonymous email containing recordings from Donald Trump’s voicemail inbox. The recordings […]

Pierluigi Paganini March 05, 2016
SIM swap fraud cases force bank to improve security

Two major high street banks will change security procedures after journalists  demonstrated how to carry out SIM swap fraud attacks. The BBC reported that two major high street banks will adopt new security measures to protect their customers. The decision to modify the security procedures follows the scoop made by two journalists from BBC Radio […]

Pierluigi Paganini March 05, 2016
Expert revealed how to hack professional drones used also by police

An expert presented his study on hijacking high-end drones commonly deployed by government and law enforcement agencies. The researcher Nils Rodday presented at the annual RSA conference in San Francisco the findings of its study on hacking drones. Rodday, who currently at IBM, has conducted his research while working as a graduate researcher at the University of Twente […]

Pierluigi Paganini March 05, 2016
New exploit steals secret cryptographic keys from mobile devices

A group of security researchers has devised a new attack scheme to steal cryptographic keys from both Android and iOS devices. A team of security researchers from Tel Aviv University, Technion and The University of Adelaide has elaborated a new attack scheme to steal cryptographic keys from both Android and iOS devices. Last month, the same team […]

Pierluigi Paganini March 04, 2016
Real pirates used hacking techniques to raid a shipping company

Real pirates have hacked into a shipping company to locate valuable cargo before hijacking vessels in targeted attacks. Technology meets Piracy. The technology is enlarging our surface of attack in a dramatic way, every company in every industry is potentially a target. Let’s discuss today of a singular case that demonstrates it, pirates have hacked into […]

Pierluigi Paganini March 04, 2016
A day attack with DDoS booter cost $60 and can cause $720k in damage

According to a study conducted by the experts at Arbor’s ASERT Team a day attack with a DDoS booter cost $60 and can cause $720k in damage. We have discussed several times about the concept of cybercrime-as-a-service, today I’ll show you a case related the offer for rent of distributed-denial-of-service (DDoS) attacks for less than US$60 per day. […]

Pierluigi Paganini March 04, 2016
Which are most used passwords in opportunistic criminal attacks?

Which are the usernames and passwords used by hackers when they scan the internet indiscriminately? Give a look to the Rapid7′ report Recently the firm Splashdata revealed in its annual report on the worst 2015 passwords (“123456” and “password”), today I desire to present you a new interesting study on passwords conducted by Rapid7. The experts used Heisenberg, […]

Pierluigi Paganini March 03, 2016
$17 smartwatch includes a backdoor in the pairing app

A group of researchers that analyzed security of a number of smart watches discovered a $17 smartwatch is sold with a backdoor in the pairing app. Be careful of cheap smartwatch offered on the web, security researchers at Mobile Iron have found that the U8 Smartwatch available on eBay for sale is offered with an Android or iOS app […]