Hacking

Pierluigi Paganini January 12, 2015
CyberCaliphate group hacked US CENTCOM Social Media Accounts

ISIS supporters have hacked the YouTube and Twitter accounts belonging to the US CENTCOM leaking online internal documents stolen from mobile devices. While Anonymous started the #OpCharlieHebdo campaign against jihadist websites to avenge the attack against the Charlie Hebdo, hackers of the CyberCaliphate group, claiming to support the terrorist group ISIS, have compromised the official […]

Pierluigi Paganini January 12, 2015
MiniDuke, CosmicDuke and OnionDuke have a same matrix

Security experts collected further evidences of the link between the CosmicDuke, Miniduke and OnioDuke Advanced Persistent Threat campaigns. Researchers at F-Secure firm are constantly monitoring the cyber espionage campaigns MiniDuke, CosmicDuke and OnionDuke and provided an interesting update on the hacking operation. Below a short description of the campaigns: MiniDuke: Kaspersky Lab and Hungary’s Laboratory of Cryptography and System Security, or CrySyS, […]

Pierluigi Paganini January 11, 2015
UPDATE Charlie Hebdo TANGO DOWN – Anonymous promises to avenge the massacre

The Anonymous collective published a video message online promising to avenge the Charlie Hebdo massacre by razing jihadist websites. A few hours ago the two brothers believed to be members of the terrorist commando that has attacked on Wednesday the offices of French satirical newspaper Charlie Hebdo were killed. The manhunt is over with another […]

Pierluigi Paganini January 09, 2015
ASUS router firmware affected by root command execution flaw

Several ASUS routers include a service that listens on UDP broadcast port 9999 on the LAN interface and contains an unauthenticated command execution flaw. The Security researchers Joshua Drake discovered a serious vulnerability in the firmware running on several ASUS routers that allows an unauthenticated attacker to run arbitrary command on the device. According to the expert, […]

Pierluigi Paganini January 08, 2015
Hacking an ATM with a Samsung Galaxy 4 Smartphone

Hackers hit ATM systems forcing them to dispense the cash stored in their money cases relying on certain commands sent through a smartphone. Cybercriminals can hack ATM systems and force it to dispense the cash using a smartphone, in the specific case a Samsung Galaxy 4 phone. The model of smartphone is not important, the […]

Pierluigi Paganini January 07, 2015
CERT CC warns about critical flaws in UEFI implementations

The Carnegie Mellon University CERT/CC warned about the presence of serious vulnerabilities in the Unified Extensible Firmware Interface (UEFI). The CERT/CC has issued three different advisories for security flaws identified in the Unified Extensible Firmware Interface (UEFI). The Unified Extensible Firmware Interface (UEFI) (pronounced as an initialism U-E-F-I or like “unify” without the n) is a specification that defines a software interface between an operating […]

Pierluigi Paganini January 06, 2015
Apple has patched the iCloud flaw exploited by iDict tool

Apple has patched the iCloud flaw exploited by iDict tool, the news was confirmed by the author of the hacking application via Twitter. Last week the iDict hacking tool has been released by a hacker known as Pr0x13, the expert posted the code of iDict on GitHub explaining that it is very easy to use and exploits a […]

Pierluigi Paganini January 06, 2015
Wifiphisher – Automated phishing attacks against Wifi networks

A Greek security researcher has developed WiFiPhisher, a Wi-Fi social engineering tool that is designed to steal credentials from users of WPA networks. The Greek security expert George Chatzisofroniou has developed WiFiPhisher, a WiFi social engineering tool that allows an attacker to steal credentials from users of secure WiFi networks. WiFiPhisher is available for download on the software […]

Pierluigi Paganini January 05, 2015
Thunderstrike hack – Infecting Apple Mac with EFI Bootkit

A security researcher has presented a technique dubbed Thunderstrike hack to infect Apple’s Mac PCs with with EFI Bootkit through the Thunderbolt port. Infect Apple Mac PCs exploiting the Thunderbolt port is possible, the security researcher Trammell Hudson has demonstrated how it is possible during  the last edition of the annual Chaos Computer Congress in Hamburg, Germany. The […]

Pierluigi Paganini January 05, 2015
Several Electronic Arts Origin accounts hacked

Many gamers are finding purchases that they never made their accounts for Electronic Arts Origin service. Once again the gaming industry under attack. There is no peace for the companies operating in the gaming industry. During Christmas holidays, the hackers of Lizard Squad brought down the PSN and Xbox live services, while yesterday the hacking […]