Hacking

Pierluigi Paganini January 14, 2016
Silverlight exploit discovered by analyzing Hacking Team leaked emails

Microsoft patched a Silverlight zero-day discovered by analyzing internal emails stolen to Hacking Team about Silverlight exploit. Microsoft recently fixed a number of vulnerabilities with the MS16-006 critical bulletin, including a Silverlight flaw CVE-2016-0034 that could be exploited for remote code execution. The Silverlight flaw discovered by the experts at Kaspersky Lab as a result of an investigation on the Hacking Team arsenal disclosed in […]

Pierluigi Paganini January 13, 2016
How to convert 30$ D-Link DCS web cameras into a backdoor

A group of researchers from Vectra Threat Labs explained how to exploit IoT devices like 30$ D-Link DCS web cameras as a backdoor. Vectra Threat Labs, part of Vectra Networks has invested time testing some IoT solutions available in the market, and one of the most interesting products its always the Wi-Fi security web cameras. […]

Pierluigi Paganini January 13, 2016
SSH backdoor discovered in Fortinet FortiOS firewalls

Another SSH backdoor? Researchers have discovered highly suspicious code in the Fortinet FortiOS firewalls that were shipped with hardcoded logins. After Juniper, another Enterprise security vendor is in the headlines, this time it is Fortinet for the presence of a SSH ‘backdoor in its firewalls. Less than a month ago, an “unauthorized code” was discovered in the operating system for […]

Pierluigi Paganini January 12, 2016
Shocking, Teen hacker Cracka owned head of US intelligence James Clapper

Head of US intelligence James Clapper owned by the same hacker who broke into CIA director Brennan’s personal email account. According to Motherboard, a hacker associated with the “Crackas With Attitude” group has accessed accounts belonging to the director of National Intelligence, James Clapper. Yes, you are right, Crackas With Attitude is the same teenager who took […]

Pierluigi Paganini January 12, 2016
A research team has found two flaws in the OAuth 2.0 protocol

According to a group of researchers from the University of Trier two critical flaw affects the oAuth 2.0 authentication protocol. The OAuth 2.0 authentication protocol is widely used on social networking sites, every day billion of users access their profiles on Facebook and Google+ using it. According to researchers Daniel Fett, Ralf Küsters and Guido […]

Pierluigi Paganini January 12, 2016
A XSS may have exposed users of the eBay website to phishing attacks

A security researchers reported a Cross-Site Scripting (XSS) vulnerability that may have exposed users of the eBay website to phishing attacks. An independent security researcher, using the nickname MLT, reported last month a simple flaw affecting the eBay website exposed its customers to phishing attacks. An attacker can exploit the vulnerability to host a bogus phishing page on the eBay website attempting […]

Pierluigi Paganini January 12, 2016
Google hacker criticized TrendMicro for critical flaws

A hacker with Google Project Zero research team, publicly disclosed critical vulnerabilities in the TrendMicro Antivirus. Tavis Ormandy, a researcher with Google’s Project Zero vulnerability research team, publicly disclosed critical vulnerabilities in TrendMicro Antivirus that could be exploited to execute malicious code on the targeted system. Ormandy took only about 30 seconds to find the […]

Pierluigi Paganini January 11, 2016
Watchout Smart TV Malware is Here

Security experts at Kaspersky Lab investigated a threat to discover it was specifically designed to compromise Smart Tv devices or it was an accidental infection. A Reddit user with username being “moeburn” raised the likelihood of new malware flowing for Smart TVs, this week: My sister got a virus on her TV. A VIRUS ON […]

Pierluigi Paganini January 10, 2016
Why PS4 is not so secure for the ISIS members’ communication?

Duo Labs demonstrated that there’s no reason to think that PS4 or Xbox are any more secure than anything else when dealing secret communication. Members of the ISIS terrorist group make large use of technology, security experts believe that it is radical organization with the greatest cyber capabilities in the history. Recently a footage published […]

Pierluigi Paganini January 10, 2016
The FBI used the NIT to de-anonymize thousand Pedos on Tor

The US law enforcement conducted an unprecedented hacking campaign leveraging on the  network investigative technique (NIT) to de-anonymize Tor users. In July, at least two individuals from New York have been charged with online child pornography crimes after visiting a hidden service on the Tor network. The Federal Bureau of Investigation (FBI) had used a hacking […]