Hacking

Pierluigi Paganini June 11, 2015
Apple iOS flaw exploitable to steal user password with a phishing email

A security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing email. A new vulnerability that affects Apple’s iOS could be exploited by hackers to collect user passwords by using a single email. Jan Soucek (@jansoucek) , a forensic expert at Ernst and Young has developed […]

Pierluigi Paganini June 10, 2015
Duqu 2.0 the most sophisticated threat ever seen targeted also Kaspersky

Threat actors used a Duqu 2.0 worm in a series of attacks worldwide that also breached the systems at Kaspersky Lab. It is most complex malware ever seen. A new powerful strain of Duqu malware, dubbed Duqu 2.0, appeared in the wild after going dark in 2012. Duqu 2.0 is a very sophisticated agent that exploited a number […]

Pierluigi Paganini June 10, 2015
FireEye claims Russian APT28 hacked France’s TV5Monde Channel

FireEye speculates that behind the hack of France’s TV5Monde television channel there is the popular APT28 that used the pseudonymous ISIS Cyber Caliphate. Security experts involved in the investigation on the hack of France’s TV5Monde television channel revealed that behind the pseudonym of ISIS “Cyber Caliphate” there were Russian hackers. “Russian hackers posing as the ISIS “Cyber Caliphate” […]

Pierluigi Paganini June 10, 2015
ISIS Book of Terror for Wi-Fi Hacking and the use of spy tools

ISIS supporters are spreading online a collection of tutorial titled the Book of Terror to teach how Hack a Wi-FI network and which are main spying tools. ISIS militants are spreading a small package, titled Book of Terror, containing data of various spy tools, as well as tutorials on how to hack Wi-Fi networks in […]

Pierluigi Paganini June 09, 2015
Self-driving cars cars hacking, a real scenario

Autonomous and connected vehicles, self-driving cars, are exposed to numerous cyber threats and the risk of hacking is concrete. After Security expert and hacker, Chris Roberts announced the possibility of hacking into aircrafts, more tension about the security of autonomous and connected vehicles has come to the fore. These cars are expected to be on […]

Pierluigi Paganini June 09, 2015
NFC attack can steal your credit card information

Crooks are using the NFC capability of Android smartphone to steal your credit card data, two researchers presented the PoC at the HITB. Crooks are using the NFC capability of Android smartphone to steal your credit card data, it’s scaring but true. But first let’s introduce the Near field communication (NFC) as “a set of […]

Pierluigi Paganini June 09, 2015
SEA – Syrian Electronic Army defaced the US Army website

The hackers of the SEA, the Syrian Electronic Army, defaced the US Army website exploiting an Army’s commercial content delivery network provider. After a short period of silence, the group SEA and defaced the official website of the US Army and added a pop-up message displaying the following text: “Your commanders admit they are training the people they […]

Pierluigi Paganini June 08, 2015
OpenSesame – Open a fix-code garage with a toy in a few seconds

The hacker Samy Kamkar has developed a method dubbed OpenSesame that enables him to open almost any garage door that uses a fixed code by using a $12 toy. The beloved Samy Kamkar has created a new way to open garage doors with a toy from Mattel, that he called “OpenSesame.” OpenSesame is a great […]

Pierluigi Paganini June 08, 2015
MEDIJACK – How cyber criminals violate health care systems

TrapX, a renowned security providing delivery of deception based cybersecurity  defense uncovered a security flaw in medical field dubbed as medical device hijack, or simply put MEDIJACk. The flaw can allow attackers to exploit main healthcare systems by breaking into the unpatched and outdated medical devices. Let it be Anthem hack or CareFirst BlueCross BlueShield, this year has […]

Pierluigi Paganini June 07, 2015
PunkSPIDER, the crawler that scanned the Dark Web

Security experts developed their PunkSPIDER, a Tor crawler, that already scanned more than 7000 domains and discovered numerous vulnerabilities. We have discussed several times about the Tor anonymizer network and the way it is exploited  by criminal crews to sell any kind of illegal product and service. Last week, an automated scanner dubbed PunkSPIDER was launched in the […]