Hacking

Pierluigi Paganini March 06, 2015
SIGA data breach exposed confidential data of 98000 US Military Personnel

Air Force Exchange Service (AAFES) confirms that following the SIGA data breach, confidential data belonging to US military personnel were exposed. A bad news for the US military, the Army and Air Force Exchange Service (AAFES) confirms that, following a the data breach of the German telecom company SIGA Telecom and an AAFES contractor occurred on March 5, […]

Pierluigi Paganini March 06, 2015
All Windows systems are vulnerable to the FREAK attack

According to a security advisory published by Microsoft all supported versions of Windows are affected by the recently discovered FREAK vulnerability FREAK is major security SSL/TLS vulnerability recently discovered that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of legitimate and secure websites. The critical […]

Pierluigi Paganini March 05, 2015
Drones spying on cell phones for Advertizing campaigns

The Singapore-based company AdNear is using a fleet of commercial drones to determine users’ location and deliver hyper-targeted ads. Drones that spy on unaware people, a nightmare come true, apparently nothing new considering that it is a common practice of law enforcement and Intelligence agency. The bad news is that also a few advertising companies are also […]

Pierluigi Paganini March 04, 2015
FREAK, the new vulnerability that threatens the IT industry

FREAK, a new major security flaw that left users of Apple and Google devices exposed to MITM attack while visiting supposedly secure Websites. IT industry is facing with a new major security SSL/TLS vulnerability that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of […]

Pierluigi Paganini March 03, 2015
D-Link home routers affected by remote command injection flaw

D-Link routers contain a vulnerability that could be exploited by attackers to get root access remotely and run several attacks. Once again security experts have found security vulnerabilities in home routers, these devices are a privileged target of cyber criminals that exploit the flaws in the software they run for several purposes. This time the flawed routers […]

Pierluigi Paganini March 02, 2015
How to serve malware by exploiting Blu-ray disc attacks

A British hacker has found two Blu-Ray-borne attacks that could be run to infect machines, a technique that remind the method used by the Equation Group. Security expert Stephen Tomkinson from NCC Group has discovered a couple of vulnerabilities in the software used to play Blu-ray discs. The exploitation of the flaw could be used to implant […]

Pierluigi Paganini March 02, 2015
Hacking the hackers : A cyber resilience approach

A cyber resilience approach: the need to become cyber resilient is very essential because eliminating risks completely is impossible. Hacking emerged as a geeky, tech-oriented culture that was a little mischievous, but ultimately was about programming and finding faults or bugs in the code. It has evolved over time to become a criminal activity. The […]

Pierluigi Paganini March 02, 2015
Seagate NAS affected by a Remote Code Execution zero-day vulnerability

 A security expert discovered a Remote Code Execution zero-day vulnerability in Seagate Network Attached Storage (NAS) systems. A critical zero-day vulnerability affects Network Attached Storage (NAS) device software produced by the Seagate firm. The vulnerability was discovered by the security researcher OJ Reeves on October 7 and reported to Seagate that still hasn’t fixed the zero-day. The Seagate […]

Pierluigi Paganini February 27, 2015
Pharming attacks exploit default passwords to hack routers

Experts at Proofpoint uncovered a pharming attack that uses phishing to exploit router vulnerabilities and carry out malicious activities. Security firm Proofpoint revealed that its experts recently detected a spam campaign targeting organizations and primarily Brazilian Internet users. The spam campaign implements a very effective technique to spy on a victim’s Web traffic. The particularity of this […]

Pierluigi Paganini February 27, 2015
Joomla Reflection DDoS attacks exploit a Google Maps Plugin flaws

Akamai firm discovered numerous attacks exploiting a known vulnerability in a Google Maps plugin to run Joomla Reflection DDoS attacks against enterprises. Experts from Akamai Technologies’ Prolexic Security Engineering and Response Team (PLXsert) have discovered a vulnerability allows attackers to turn Joomla servers using the Google Maps plugin into a DDoS hacking tool. The worrying aspect […]