Hacking

Pierluigi Paganini August 18, 2015
SS7 flaw allows hackers to spy on every conversation

By Exploiting a flaw in the SS7 protocol hackers can access every conversation and text message mobile users send from everywhere in the world. Hackers can spy on every mobile phone user wherever it is. Channel Nine’s 60 Minutes has revealed the existence of a security hole in modern telecommunication systems that could be exploited by […]

Pierluigi Paganini August 17, 2015
An Italian expert discovered two zero-day flaws in MAC OS X

An Italian security researcher has discovered two zero-day vulnerabilities in Apple MAC OS X that could be exploited to gain remote access to a PC. An Italian teenager, Luca Todesco, has found a couple of critical zero-day vulnerabilities in Apple OS X operating system that could be exploited to gain remote access to a PC. The […]

Pierluigi Paganini August 17, 2015
Antivirus industry damaged by the Kaspersky’case

Kaspersky sustains the Reuters’s story on Antivirus false positives is based on information provided by anonymous former KL employees which are not reliable Some days ago, Reuters published a story about Kaspersky revealing that the Russian company was creating malicious codes to give them an upper hand against their direct competitors. Eugene Kaspersky in the […]

Pierluigi Paganini August 17, 2015
Exploiting BitTorrent flaws to run Distributed Reflective DDoS

Security researchers discovered a new technique to exploit BitTorrent to run powerful DDoS amplification attacks that could bring down great websites. A weaknesses in the open BitTorrent protocol makes some of the most widely used BitTorrent applications, including uTorrent, Mainline, and Vuze vulnerable to a form of denial of service attack. The form of DDoS […]

Pierluigi Paganini August 17, 2015
The OwnStar Attack also works with BMW, Chrysler, Mercedes Cars apps

While the Ownstar attack has been fixed by GM, the same flaw affects also BMW Remote, Mercedes-Benz mbrace, and Chrysler Uconnect apps. Recently I wrote about the OwnStar attack presented by the popular hacker Samy Kamkar, a new gadget designed by the expert that could be exploited to hack GM Cars. The tool developed by Kamkar allows to locate […]

Pierluigi Paganini August 16, 2015
Security Affairs newsletter Round 22 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. ZigBee-sniffing drone used to map online Internet of Things RollJam, a $30 device to unlock the majority of car doors Tesla tech top dog downs slug of Scotch, increases […]

Pierluigi Paganini August 16, 2015
How to hack a Parrot drone on the fly

Two security researchers at the recent Def Con conference presented the results of their studies on hacking Parrot drones.  Their findings are surprising. At the recent Def Con conference in Las Vegas, security experts demonstrated in two different talks how to exploit vulnerabilities in commercial drones manufactured by Parrot. In one of the attacks, the […]

Pierluigi Paganini August 15, 2015
Zero-Day in the Google Admin App can bypass Android sandbox

MWR Labs have disclosed information on an unpatched vulnerability that allows an attacker to easily bypass the Android sandbox. Other problems for the popular Android OS, after the discovery of the Stagefright vulnerabilities and other security flaws recently revealed by security researchers, now experts at MWR Labs have disclosed information on an unpatched vulnerability that allows […]

Pierluigi Paganini August 13, 2015
Cisco warns hackers are installing malicious ROMMON images on its devices

Cisco is warning enterprise customers about a spike in attacks in which hackers use valid admin credentials on IOS devices to install bogus ROMMON images. Be aware network administrators, Cisco released a new Security Activity Bulletin referring a spike in attacks in which hackers use valid credentials on IOS devices to log in as administrators […]

Pierluigi Paganini August 13, 2015
Yet malicious software found on Lenovo PCs

Chinese computer manufacturers Lenovo has been caught once again using a hidden Windows feature to preinstall unwanted and unremovable rootkit. Lenovo firm was accused several times to supplying equipment for networks of the intelligence and defense services various countries that allowed the Chinese Government to run espionage operations. In 2013, Spy agencies reportedly have a long-standing […]