Hacking

Pierluigi Paganini February 02, 2015
Hackers stole GigaBytes of Syrian opposition’s data, including battle plans

A report issued by FireEye revealed that hackers have stolen GigaBytes of data from Syrian opposition’s computers, including battlefield plans. A recent report issued by FireEye revealed that hackers tapped into Syrian opposition’s computers and have stolen gigabytes of secret communications and battlefield plans. In mid-2013, ten armed units belonging to the opposition to the Syrian Government were […]

Pierluigi Paganini February 02, 2015
The Pirate Bay back online … with many doubts

The Pirate Bay is online again, but many shadows obfuscate its rebirth. Angry staff members promise to open the full site back on a separate domain. The torrent-indexing website Pirate Bay has risen again after almost two months of total outage. The Pirate Bay it the most popular file-sharing website used to share copyrighted material free of charge, last year it […]

Pierluigi Paganini February 02, 2015
BMW fixes security flaw in 2.2 million car software

A security vulnerability in the BMW Connected Drive system allowed security experts to send remote unlocking instructions to the cars. Modern cars are complex systems composed of several components interconnected by internal networks, each system within these architectures is exposed to the risk of cyber attacks. Recently the German carmaker BMW has fixed a security […]

Pierluigi Paganini February 01, 2015
Three credit card transactions could reveal your identity

A recent study on the use of metadata to de-anonymize users revealed that three credit card transactions could reveal your identity. Privacy is the great utopia of a society based on the technology, every action we make leaves a track that could be used to reveal our identity, track our profile and monitor our habits. We have […]

Pierluigi Paganini January 31, 2015
Hacking sex toys and dolls

The security expert Ken Munro has run a series of penetration tests on sex toys and dolls for children … the results are disconcerting. Everything that could be connected to a computer could be potentially exploited to hack it, we read about several cases that demonstrated how it is possible to compromise a PC by […]

Pierluigi Paganini January 31, 2015
PHP Applications and WordPress exposed to the Ghost flaw

PHP applications and WordPress CMS might be affected by the GHOST vulnerability that could be exploit to compromise the hosting servers. The critical GHOST vulnerability (CVE-2015-0235) in the GNU C library (glibc) may have a greater impact than imagined, security experts have discovered that PHP applications, including the popular WordPress Content Management System (CMS), could also […]

Pierluigi Paganini January 29, 2015
WhatsApp Web client and Mobile App affected by privacy issues

The 17-year-old security researcher Indrajeet Bhuyan discovered two security flaws in the newborn WhatsApp Web client which menace user privacy. Just a week after the presentation of WhatsApp Web, the desktop version of the popular mobile messaging application WhatsApp, a 17-year-old security researcher Indrajeet Bhuyan discovered two security flaws. Bhuyan is already known to the IT security community because […]

Pierluigi Paganini January 29, 2015
Critical DNS hijacking flaw affects D-Link DSL router

Critical DNS hijacking flaw affects D-Link DSL router, the flaw affects the ZynOS firmware that is used also by other vendors, including TP-Link and ZTE. A security vulnerability affects DSL router model from D-Link, the flaw could be exploited by a remote attacker to change device DNS settings and hijack users’ traffic. The Bulgarian security […]

Pierluigi Paganini January 27, 2015
Reading the ENISA Threat Landscape 2014 report

The European Union Agency for Network and Information Security has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.” The European Union Agency for Network and Information Security (ENISA) has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.” This ENISA Threat Landscape 2014 report (ETL 2014) was prepared […]

Pierluigi Paganini January 27, 2015
A hacker developed Maldrone, the first malware for drones

Security expert Rahul Sasi has discovered and exploited a backdoor in Parrot AR Drones that allows him to remotely hijack the UAV with the malware Maldrone. The diffusion of drones is alerting government and authorities, small Unmanned Aerial Vehicles (UAVs) are used more frequently in different sectors. The security of drones in both military and […]