Hacking

Pierluigi Paganini December 23, 2014
Seizure of the directory authorities could block the Tor network

The Tor network could be seriously impacted by the seizure of directory authorities operated by law enforcement, despite it is a precious resource for all. The overall architecture of Tor network relies on nine directory authorities locate in the Europe and United States. The servers working as directory authorities provide a signed list of all the […]

Pierluigi Paganini December 20, 2014
USBdriveby, how to compromise a PC with a $20 microcontroller

USBdriveby is a device designed to quickly and covertly install a backdoor and override DNS settings on an unlocked machine via USB. The security experts Samy Kamkar (@SamyKamkar) has proposed a very interesting way to compromise an unlocked computer and deploy a backdoor on it simply by using a pre-programmed Teensy microcontroller. The cheap ($20) […]

Pierluigi Paganini December 20, 2014
Google is aware of NTP Exploits publicly available

Security researchers at Google have discovered several serious flaws affecting the NTP protocol, which are remotely exploitable by the attackers. Security experts at Google have uncovered several serious flaws in the Network Time Protocol (NTP), including several buffer overflows that are remotely exploitable. The Network Time Protocol is a networking protocol for clock synchronization between […]

Pierluigi Paganini December 19, 2014
New security flaws in the SS7 protocol allow hackers to spy on phone users

German researchers have announced the discovery of news security flaws in SS7 protocol that could be exploited by an attacker to spy on private phone calls. A team of German researchers has discovered security flaws that be exploited by a threat actor to spy on private phone calls and intercept text messages on a large […]

Pierluigi Paganini December 19, 2014
Several critical security vulnerabilities affect the Glassdoor website

The security expert  Mohamed M.Fouad discovered several critical security vulnerabilities at Glassdoor, which can lead to very harmful impact on all users. The Independent Security Researcher Mohamed M.Fouad has discovered  a lot of critical security vulnerabilities at Glassdoor that could lead to very harmful impact on all users.  Mohamed M.Fouad an Independent Security Researcher from Egypt. I […]

Pierluigi Paganini December 18, 2014
Misfortune Cookie flaw exposes more than 12 million SOHO routers to the risk of a cyber attack

More than 12 million devices are vulnerable to a simple attack that could compromise their home routers exploiting a vulnerability called Misfortune Cookie. More than  12 Million Home Routers are affected by a vulnerability called Misfortune Cookie that expose users to the risk of cyber attack. Researchers at Check Point Software Technologies reported the Misfortune Cookie flaw affects millions of devices running […]

Pierluigi Paganini December 18, 2014
ICANN systems compromised via Spear Phishing attack by unknown hackers

The ICANN organization confirmed that several its systems were compromised via Spear Phishing attack. The company is investigating the case. ICANN revealed the details of a recent spear phishing attack that allowed unknowns to access its network. The attackers spoofed the ICANN domain, and deceived internal staff into revealing their email credentials. The ICANN is the organization […]

Pierluigi Paganini December 18, 2014
Anonymous hacked Swedish government email accounts in retaliation for the seizure of Pirate Bay servers

Members of the Anonymous collective have hacked several Swedish government email accounts over seizure of The Pirate Bay servers. Many cyber security experts consider hacktivists as a threat that is swarming, but it’s my opinion it is a serious error to underestimate their capabilities and the Stratfor case is probably the most blatant demonstration of their […]

Pierluigi Paganini December 17, 2014
Wireless Aerial Surveillance Platform, the DIY Spy Drone

Vespid is amongst most the important espionage artifacts based on the Wireless Aerial Surveillance Platform for the for the construction of a DIY Spy Drone. The Wireless Aerial Surveillance Platform is a small DIY drone that has the capability to crack Wi-Fi passwords, eavesdropping on Wi-Fi passwords, eavesdropping on cell phone calls and read text […]

Pierluigi Paganini December 17, 2014
Grinch Bug Could be worse than Shellshock, Says Experts

Researchers discover a vulnerability in Linux operating systems dubbed Grinch Bug, which is exploited to give malicious hackers Root access to a computer system. The flaw resides in the authorization system in Linux which allows privilege escalation through the wheel. A new privilege escalation bug similar to shellshock is giving Linux administrators sleepless nights just days after […]