Hacking

Pierluigi Paganini April 29, 2015
Hacker Implants NFC Chip to Bypass Military Security Scans

A security researcher implanted an NFC Chip in his Hand to bypass security scanners in high-security environment and exploit Android mobile devices. I confess that I’m curious about some news, but at the same time I’m worried about the “penetration” of technology in our lives.  This is the case of a security researcher that used an […]

Pierluigi Paganini April 29, 2015
Hacking PayPal server by exploiting a Remote Code Execution flaw

Security expert discovered a way to hack a PayPal server by exploiting a Remote Code Execution flaw affecting the Java Debug Wire Protocol (JDWP) protocol. Security researcher Milan A Solanki discovered a new critical remote code execution vulnerability in PayPal platform. An attacker could exploit the vulnerability to execute arbitrary code on the PayPal  Marketing online-service […]

Pierluigi Paganini April 29, 2015
How to exploit flaws in InFocus IN3128HD Projector to hack host network

The firmware running on the InFocus IN3128HD Projector is affected by an authentication bypass flaw which allows the hack of the host network. Another smart object was found vulnerable by security experts, it is a popular projector commonly used in classrooms. The manufacturer has discovered several authentication flaws affecting the firmware running on the projector, the vulnerabilities could be […]

Pierluigi Paganini April 28, 2015
Almost 90% of Java black hats migrate to softer footling Flash targets after MS Patch or die policy

The stricken-scum now deal with an option: work harder in order to find Java zero days or simply abandon dispatch and begin exploiting older Flash-bugs. Redmond’s security heads trust – Matt Miller, Tim Rains and David Watson – claim its patch wrecking-ball, employed only to out of the date Java installations previous year, which forced […]

Pierluigi Paganini April 27, 2015
WordPress fixed a Zero Day a few hours after its disclosure

WordPress has just released a critical update to fix a serious XSS vulnerability that allows attackers to easily hijack websites based on the popular CMS. A cross-site scripting vulnerability is threatening WordPress content management system platforms worldwide. The popular CMS is used by nearly 186,700 of the top one million websites. An attacker can exploit the […]

Pierluigi Paganini April 27, 2015
US hospitals will use AC power probes to remove malware from medical devices

WattsUpDoc is a platform developed by two researchers for the monitoring of medical devices and detection of potentially “life-threatening malware.” Two US Hospitals will start using a system that can detect malware infections of medical devices, the technique relies on a probe that monitors the AC power consumption of the units. The hospitals (name were […]

Pierluigi Paganini April 27, 2015
We are not prepared for a cyber attack on Western energy infrastructure

The NSA veteran Chief General Keith Alexander fears crippling cyber-attack on Western energy infrastructure and warned that we are not prepared for that. Security experts are warning companies in the energy industry of possible cyber attacks and Western plants are more exposed to the cyber threats. Electric grids, oil refineries and power plants are the […]

Pierluigi Paganini April 27, 2015
Russian Hackers accessed President Barack Obama emails

The Time revealed that Russian hackers have accessed President Barack Obama emails in the attack on the White House’s unclassified computer system. Earlier this month, US officials admitted there was a cyber “event” late last year, but refused to confirm reports Russia was behind the attack. New revelations on the attack against the unclassified network […]

Pierluigi Paganini April 26, 2015
Samsung Galaxy S5 vulnerability allows hackers to steal fingerprints

Security researchers at FireEye have discovered a vulnerability in the Samsung Galaxy S5 that allows hackers to clone fingerprints. Samsung Galaxy S5 and other ‘unnamed Android devices’ could leak user fingerprints to hackers that can clone them. According to security experts at FireEye, although Samsung implements encryption mechanism to protect user fingerprints archived on the mobile […]

Pierluigi Paganini April 26, 2015
Hacking telesurgery robots, a concrete risk

Security experts have conducted an experimental to analyze cyber security threats against teleoperated surgical robots in telesurgery. Technology will help humans to overwhelm any obstacle, one of them is the concept of space that for some activities could represent a serious problem. Let’s think for example to a life-saving surgery that could be performed by surgeons that […]