Hacking

Pierluigi Paganini November 24, 2014
How hackers are exploiting vulnerable DVRs to conduct illegal activities

Security experts discovered a new malware that targets DVR and other Internet of Things devices recruiting them for different illegal activities. DVR, abbreviation for Digital Video Recorders systems, from Hikvision firm are affected by vulnerabilities that allow an attacker to hack them remotely. Digital Video Recorders are systems used to record surveillance footage of office buildings and […]

Pierluigi Paganini November 23, 2014
Ecuadorean President Correa claims attacks on his private computers and accounts

Ecuadorean President Correa has publicly denounced the US Intelligence continuous cyber attacks against his private internet accounts and computers. Ecuadorean President Rafael Correa has publicly denounced the US Intelligence of “systematic, high-tech” cyber attacks on his private internet accounts and computers. The President Rafael Correa also revealed that the last attack occurred  on Thursday, November 20th, was […]

Pierluigi Paganini November 23, 2014
Electronic cigarettes exploited in the wild to serve malware

In a discussion started on the Reddit news media website it has been debated the case of a malware implanted by using electronic cigarettes connected over USB. Hackers are able to exploit any electronic device to serve a malware of to compromise a poorly protected network, electronic cigarettes have become the latest vector to serve spread […]

Pierluigi Paganini November 22, 2014
DoubleDirect MitM Attacks are targeting users worldwide

Security experts at Zimperium discovered a new MITM attack technique dubbed DoubleDirect that is targeting iOS, Android and Mac users worldwide. DoubleDirect is the name of a new Man-in-the-Middle (MitM) attack discovered by security researchers that is targeting mobile devices running either iOS or Android and potentially Mac OS X systems. The DoubleDirect MitM attack allows attackers to hijack the victim’s traffic […]

Pierluigi Paganini November 22, 2014
PlayStation Network and Widows Live alleged hacks. Why experts afraid attacks on gaming platforms?

Latest report indicates that the alleged hack on Sony’s PlayStation Network, Windows Live and 2k games studio by Derp Tolling could be a hoax. News going round that Derp Trolling hacked Sony’s PlayStation Network(PSN), Microsoft’s Windows Live and 2k games studio freaked out millions of users, but now security experts says the alleged hack could […]

Pierluigi Paganini November 18, 2014
The latest Windows Phone 8.1 has been hacked

Operators of the XDA-developers forum explained how it is possible to hack Windows Phone 8.1 to run any app package in any Program directory. XDA-developers have discovered a new vulnerability in latest Microsoft OS Windows Phone 8.1 that could easily be exploited by attackers to compromise a Nokia Lumia phone running it. The XDA Developers member […]

Pierluigi Paganini November 15, 2014
81 percent of Tor clients can be identified with traffic analysis attack

The research revealed that more than 81 percent of Tor clients can be de-anonymized by exploiting a new traffic analysis attack based on Netflow technology. A team of researchers conducted a study between 2008 and 2014 on the de-anonymization of the Tor users, the team worked to disclose their originating IP addresses. A group led by […]

Pierluigi Paganini November 13, 2014
BadUSB update, it is hard to discriminate patchable USB devices

The researcher Karsten Nohl and his team presented an update on their BadUSB study.It is impossible to discriminate patchable devices from unpatchable ones. Earlier August 2014 the security expert Karsten Nohl and his team discovered that an attacker could exploit a new class of attacks based on a USB device to compromise a targeted machine. […]

Pierluigi Paganini November 10, 2014
Manual phishing attacks are the simplest and most effective hacking technique

A study published by Google demonstrates that manual phishing attacks are the simplest and most effective method for hacking email accounts. A study recently published by Google demonstrates that so-called manual phishing attacks are the simplest and most effective method for hijacking users’ email address. Let’s consider that the manual phishing attacks, as suggested by the name, doesn’t use […]

Pierluigi Paganini November 08, 2014
Belkin n750 router affected by a serious root access flaw. Upgrade the firmware now

The security researcher Marco Vaz discovered a serious vulnerability in Belkin n750 router that could be exploited to gain root access on affected devices. A serious flaw in a Belkin router could be exploited locally by an unauthenticated attacker to gain full control over affected devices. The company has already issued a patch to fix […]