Hacking

Pierluigi Paganini June 09, 2015
SEA – Syrian Electronic Army defaced the US Army website

The hackers of the SEA, the Syrian Electronic Army, defaced the US Army website exploiting an Army’s commercial content delivery network provider. After a short period of silence, the group SEA and defaced the official website of the US Army and added a pop-up message displaying the following text: “Your commanders admit they are training the people they […]

Pierluigi Paganini June 08, 2015
OpenSesame – Open a fix-code garage with a toy in a few seconds

The hacker Samy Kamkar has developed a method dubbed OpenSesame that enables him to open almost any garage door that uses a fixed code by using a $12 toy. The beloved Samy Kamkar has created a new way to open garage doors with a toy from Mattel, that he called “OpenSesame.” OpenSesame is a great […]

Pierluigi Paganini June 08, 2015
MEDIJACK – How cyber criminals violate health care systems

TrapX, a renowned security providing delivery of deception based cybersecurity  defense uncovered a security flaw in medical field dubbed as medical device hijack, or simply put MEDIJACk. The flaw can allow attackers to exploit main healthcare systems by breaking into the unpatched and outdated medical devices. Let it be Anthem hack or CareFirst BlueCross BlueShield, this year has […]

Pierluigi Paganini June 07, 2015
PunkSPIDER, the crawler that scanned the Dark Web

Security experts developed their PunkSPIDER, a Tor crawler, that already scanned more than 7000 domains and discovered numerous vulnerabilities. We have discussed several times about the Tor anonymizer network and the way it is exploited  by criminal crews to sell any kind of illegal product and service. Last week, an automated scanner dubbed PunkSPIDER was launched in the […]

Pierluigi Paganini June 07, 2015
A quick tour in the hacking black market

A quick tour in the Black Markets, the places on the web where it is possible to acquire or rent “malicious” services and illegal products. Black Markets are places on the web where it is possible to acquire or rent “malicious” services and products, these markets are growing fast and are becoming very popular in […]

Pierluigi Paganini June 07, 2015
Security Affairs newsletter Round 12 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Yemen Cyber Army will release 1M of records per week to stop Saudi Attacks The Importance of Operational Security and User Education CIA Chief: Ending NSA Spying Would Boost […]

Pierluigi Paganini June 07, 2015
The silent war between black markets in the deep web

The silent war between black markets in the deep web, Mr Nice Guy hired a blackmailer to hit TheRealDeal and its competitors. TheRealDeal hacked back. Today I desire to tell you a story of ordinary war among operators behind principal black markets. A few weeks ago I have published a detailed analysis of a new black market […]

Pierluigi Paganini June 05, 2015
Hacking Apple Pay to steal credit card data

Experts at Wandera discovered that hackers can set up a bogus access point spoofing Apple Pay and fool users into provide their credit card data. Experts at the mobile security company Wandera have reported a security flaw in Apple iOS that could be exploited to fool a user into provides his credit card data and personal […]

Pierluigi Paganini June 05, 2015
How to easily hack a WhatsApp Account?

TheHackerNews has reported a simple trick that allows to hijack a WhatsApp account easily on every mobile platform by knowing the victim’s phone number. The popular mobile messaging app WhatsApp is vulnerable to hijacking exposing hundreds of Millions of users vulnerable to attack. It could be quite easy to take over a WhatsApp account when the attacker […]

Pierluigi Paganini June 05, 2015
Harvesting clients’ information from the utility company

A security expert explained how it is possible to hack the service provided by a utility company raising serious security and privacy issues. In the most recent post of atxsec.com the owner of the blog talks about a flaw that he discovered after trying to pay his utility bill. To pay his utility bill he decided […]