Hacking

Pierluigi Paganini January 23, 2016
New RAT Trochilus, a sophisticated weapon used by cyber spies

Researchers spotted a new espionage campaign relying on a number of RATs including the powerful Trochilus threat. Security experts have uncovered a new remote access Trojan (RAT) named Trochilus that is able to evade sandbox analysis. The Trochilus malware was used to targeted attacks in multi-pronged cyber espionage operations. Experts at Arbor Networks uncovered a cyber […]

Pierluigi Paganini January 23, 2016
The Fortinet SSH backdoor found in many other products

A review of all the products allowed Fortinet to discover the same SSH backdoor on some versions of its solutions. Recently security experts reported the presence of a SSH backdoor in Fortinet firewalls, news of the day is that the company has found the same backdoor also in several new products, many of them running current […]

Pierluigi Paganini January 22, 2016
TorMail hack, FBI surgical operation, or dragnet surveillance?

In 2013 the FBI agents seized TorMail, now new information are emerging on the operations. Someone believes it was a surgical ops others accuse Feds of dragnet surveillance. In 2013 the FBI agents seized TorMail, at the time the most popular dark web email services. The US law enforcement agency seized the TorMail database during in concomitants of the […]

Pierluigi Paganini January 22, 2016
Potentially backdoored AMX equipment being used by US President Obama and US Military

Experts from the security firm SEC Consult discovered a backdoor in the AMX equipment being used by US President Obama and the US Military. AMX is a company that supplies communications systems and building control equipment to the US military, the White House and many other security organizations in the States. The particularity of these systems is the […]

Pierluigi Paganini January 21, 2016
A Reflected File Download flaw affects Google Finance

The Portuguese cyber security expert David Sopas has discovered a Reflected File Download (RFD) vulnerability affecting Google Finance. The researchers explained that different from other similar Reflected File Download he discovered in the past, this time, the attackers don’t need to create a page to force the download. “Found this vulnerability when auditing other client. With this RFD you don’t […]

Pierluigi Paganini January 21, 2016
Rapid7’s HD Moore will leave after Six Wonderful Years

HD Moore, the father of the popular Metasploit Framework, announced that he is leaving the Rapid7 security company to join a new venture capital firm. HD Moore, it is one of the most popular cyber security experts and hacker, he is the father of the popular penetration testing suite Metasploit Framework and the founder of the Metasploit Project. […]

Pierluigi Paganini January 21, 2016
The critical iOS bug allowed hackers to impersonate users

Apple has fixed a critical vulnerability in its iOS operating system that allowed hackers to impersonate end users. Apple has fixed a serious vulnerability in the iOS operating system that could be exploited by hackers to impersonate users who visit  websites that use unencrypted authentication cookies. The issue resides in the implementation of a cookie […]

Pierluigi Paganini January 20, 2016
Which are the worst passwords of 2015?

SplashData has published its fifth annual report on most used passwords in 2015, including the list of the Worst passwords of the year. For the fifth time, experts from the SplashData security firm have published a report, titled “Worst Passwords of 2015”  that analyzes the use of passwords in 2015. The researchers compiled the annual report with data […]

Pierluigi Paganini January 19, 2016
A serious Linux kernel vulnerability has been fixed

Security researchers at startup Perception Point discovered a serious vulnerability (CVE-2016-0728) affecting the Linux kernel. A Linux kernel vulnerability, coded as CVE-2016-0728, affecting versions 3.8 and higher will be fixed today. According to researchers at startup Perception Point who discovered the vulnerability, the flaw affects the Linux Kernel since 2012. The flaw has impacted more than tens […]

Pierluigi Paganini January 18, 2016
National Security Agency says US Govt new spying program meets security standards

National Security Agency says the US Govt surveillance programme for collecting domestic telephone records rmeets security standards The United States government’s updated spying program for gathering native people’ phone records has passed the muster as far as civil and privacy principles, the NSA (National Security Agency) claims. The new structure, which was executed in November […]