Hacking

Pierluigi Paganini July 05, 2015
Cisco Unified CDM platform open to cyber attacks

Cisco Unified CDM software contains a privileged account with a static password that cannot be changed, by using it an attacker can control the platform. A default privileged account with a static password that cannot be changed affect the  Cisco Unified Communications Domain Manager (Cisco Unified CDM) opening the platform for remote attacks. The Cisco […]

Pierluigi Paganini July 05, 2015
Anonymous India hacked BSNL website and compromised more than 30 Million records

Anonymous India hacked the BSNL Telecommunications Journal website and claims to have compromised more than 30 million records. The website of the BSNL Telecommunications Journal has been hacked by the hacktivists of the Indian Anonymous arm named AnonOpsIndia. Anonymous India the BSNL journal website to protest against the surveillance programs operated by the Indian Government. […]

Pierluigi Paganini July 04, 2015
Lordfenix: 20-year-old Brazilian has written 100 banking trojan

Trend Micro has identified Lordfenix, a student that created more than 100 different banking Trojans and other malicious tools, since April 2013. Security experts at Trend Micro have identified a 20-year-old Brazilian student which has developed and distributed more than 100 Banking malware. The young cyber criminal, which used the pseudonym of ‘Lordfenix’, ‘Hacker’s Son’ and […]

Pierluigi Paganini July 02, 2015
ProxyHam, a killer application to protect online anonymity

ProxyHam is a hardware device designed by a group of researchers to allow anonymous connections to Wi-Fi from about 2.5 Miles away. Security researcher Benjamin Caudill has designed a device that allows to keep anonymous users online experience, an amazing system for the anonymity of whistleblowers, journalists and dissidents. Caudill named his device ProxyHam, it’s a “hardware […]

Pierluigi Paganini July 02, 2015
Unknowns are cloning and booby trapping hundreds of Dark Web sites

Founder of the ahmia.fi project reported that someone is cloning and booby trapping hundreds of Dark Web sites and is re-writing some of the content. The “ahmia.fi” project census Dark Web websites, aka hidden services, by providing search engine functionalities by indexing the content present on the Tor network. Nurmi noticed an anomalous number of clones of hundreds […]

Pierluigi Paganini July 02, 2015
Flaw in 802.11n opens wireless networks to remote attacks

Researchers discovered a vulnerability in the 802.11n wireless networking standard that could be exploited by a remote attacker to target wireless networks. According to researchers from the Expertise Centre for Digital Media at the Hasselt University in Belgium, the frame aggregation mechanism implemented by the 802.11n wireless networking standard is affected by a security a […]

Pierluigi Paganini July 01, 2015
Apple issues a fix for Masque Attacks, but apps are still open to hack

Although Apple has fixed the Masque Attack there are still other attack scenarios that an attacker can exploit in the installation process on iOS. A team of researchers at FireEye has revealed that the last update issued by Apple only partially fixed the two vulnerabilities exploited in the Masque Attack (CVE-2015-3722/3725, and CVE-2015-3725). The two exploits […]

Pierluigi Paganini July 01, 2015
NIT, the Flash code the FBI used to deanonymize pedo’s on Tor

A look to the “NIT Forensic and Reverse Engineering Report, Continued from January 2015”. NIT code was used by the FBI to deanonymize Tor users. On December 22nd, 2014 Mr. Joseph Gross retained the assistance of Dr. Ashley Podhradsky, Dr. Matt Miller, and Mr. Josh Stroschein to provide the testimony as the expert in the process […]

Pierluigi Paganini July 01, 2015
Dino Malware that targeting Iran belong to Animal Farm’s arsenal

Researchers at ESET analyzed the Dino malware confirming that the sophisticated espionage platform belongs to the arsenal of the Animal Farm APT. Security experts at ESET have analyzed Dino, a sophisticated platform used by the Animal Farm ATP group. Earlier this year, security researchers discovered two powerful malware, dubbed Babar and Casper, likely developed by the […]

Pierluigi Paganini June 30, 2015
OPM suspends e-QIP to patch a severe security flaw

The OPM announced that it has temporarily suspended its Electronic Questionnaires for Investigations Processing (e-QIP) system to fix a security flaw. According the results of a security audit conducted after the hack at the US Office of Personnel Management (OPM) the systems of the US Department are affected by a serious vulnerability. The vulnerable system is […]