Hacking

Pierluigi Paganini June 05, 2015
Chinese hackers had access to millions records of US workers

US Government announced that a major data breach likely backed by Chinese hackers caused the exposure of data belonging to millions of government workers. Once again a data breach interested systems of the US government, the Obama administration on Thursday confirmed to have been the victim of a major cyber attack. According to the US […]

Pierluigi Paganini June 04, 2015
Thamar Reservoir – Iranian hackers target entities in Middle East

Security experts at ClearSky have published a report on the a cyber espionage campaign dubbed Thamar Reservoir that is targeting entities in the Middle East. Security experts at ClearSky have uncovered a cyber espionage campaign dubbed Thamar Reservoir due to the name of its target Thamar E. Gindin. The investigation led the experts to date the Thamar Reservoir […]

Pierluigi Paganini June 03, 2015
Sending a message brings Skype into an endless crash loop

The eight-character string “http://:” brings Skype into Endless Crash Loop, and once they’re in the user’s chat history, the app can’t start again. A few days ago we discussed about a problem occurred to iPhone and iPad users, their mobile devices were crashing after the reception of a specifically crafted text message, now a similar problem […]

Pierluigi Paganini June 02, 2015
Bundestag, the Government confirmed a data breach and data leaks

The German Government confirmed that hackers that attacked the Bundestag two weeks ago have had access to data of the German Parliament. The German Government has confirmed that hackers who breached the Bundestag systems a couple of weeks ago have also stolen data from targeted network. A spokeswoman for the Bundestag, Germany’s parliament, confirmed that unknown […]

Pierluigi Paganini June 01, 2015
Mac zero-day makes rootkit infection very easy

A security researcher discovered a zero-day vulnerability in many Mac firmware that could allow an easy installation of an EFI rootkits. The cyber security expert Pedro Vilaça has discovered a low-level zero-day vulnerability in Apple Mac systems that could be exploited by privileged users to more install an EFI rootkits. Vilaça explained that the attack is […]

Pierluigi Paganini June 01, 2015
Over 50 security glitches found in D-Link’s NVR and NAS devices

D-Link NAS and NVR products discovered with serious security bugs, users are advised to apply the patches immediately, if they have any available to them. A Hungry based security test company specializing in embedded systems, named SEARCH-LAB, has found D-Link’s NAS (Network Attached Storage) and NVR (Network Video Recorder) products having over 50 vulnerabilities. A […]

Pierluigi Paganini June 01, 2015
How to hack a Parking Management System and why?

The security researcher Jose Guasch revealed that dozens of “smart” parking management systems worldwide could be easily hacked. Everything is always online is inevitably exposed to the risk of cyber attacks, the security researcher Jose Guasch at the hacking conference Hack In The Box has explained that dozens of “smart” Parking Management System worldwide could be easily hacked. Guasch explained that […]

Pierluigi Paganini May 31, 2015
Security Affairs newsletter Round 11 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. The Phantom Menace, who targeted the oil tankers? Hi-tech car thieves use ÂŁ30 jamming devices in car parks Researcher who exploits bug in Starbucks gift cards gets rebuke, not […]

Pierluigi Paganini May 31, 2015
Yemen Cyber Army will release 1M of records per week to stop Saudi Attacks

Hackers of the Yemen Cyber Army (YCA) had dumped another 1,000,000 records obtained by violating systems at the Saudi Ministry of Foreign Affairs. The hacking crew known as the Yemen Cyber Army is continuing its campaign against the Government of Saudi Arabia. The Yemen Cyber Army (YCA) has released other data from the stolen archived belonging to the Saudi […]

Pierluigi Paganini May 29, 2015
Stegosploit hides malicious code in images, this is the future of online attacks

Stegosploit is the technique developed by the security researcher Saumil Shah that allows an attacker to embed executable JavaScript code within an image. The security researcher Saumil Shah from Net Square security has presented at Hack In The Box conference in Amsterdam his Stegosploit project which allows an attacker to embed executable JavaScript code within an […]