Hacking

Pierluigi Paganini March 21, 2014
For Google it is time to encrypt all GMail connections

Google has announced to have adopted encrypt mechanisms for all Gmail connections to reply to the increasing demand of privacy of Internet users. Google decided to encrypt all Gmail connections to reply to the increasing demand of privacy of Internet users, all the links between its data centers will be encrypted. The surveillance programs disclosed by documents leaked […]

Pierluigi Paganini March 18, 2014
Google Public DNS Server Traffic Hijacked, Millions users impacted

Google DNS public server was hijacked yesterday for 22 minutes, the victims were hijacked to the Latin America division of BT in Venezuela and Brazil. Google is undoubtedly the main targets for hackers, its services are accessed daily by billions of Internet users, a wide audience desirable for attackers. The last successfully attack against Google […]

Pierluigi Paganini March 17, 2014
QUANTUMHAND – NSA impersonates Facebook to inject malware

Recent revelations on TURBINE platform include also a disturbing truth, NSA used QUANTUMHAND exploits to implant malware in Facebook users’ machines. Last Week Ryan Gallagher and Glenn Greenwald revealed the existence of TURBINE platform, a sophisticated hacking architecture used to take control of botnet C&C servers managed by cybercrime. One of the details revealed by the journalists raised a heated […]

Pierluigi Paganini March 15, 2014
Syrian Electronic Army hacked the US CENTCOM

Syrian Electronic Army hacked the US CENTCOM and it is threatening to leak secret documents due US decision to hit Syria with electronic warfare attacks. Syrian Electronic Army (SEA) is the group of hackers that most of all is threatening the giants of the IT industry and media, the list of victims is very long (Facebook, Microsoft, NYT, […]

Pierluigi Paganini March 14, 2014
WhatsApp flaw allows hackers to steal private Chats on Android devices

A security consultant disclosed a security flaw in WhatsApp which can be exploited to gain access to the private chats of Android device owners.    The recent acquisition of WhatsApp by Facebook has done much to discuss, ever a price so high was paid for an app, but major concerns relate to users’ privacy. The security consultant Bas Bosschert […]

Pierluigi Paganini March 13, 2014
Samsung Galaxy backdoor allows files access on the mobile’s storage

Replicant developers Kocialkowski has discovered a backdoor inside Samsung Galaxy which allows file access on the mobile’s storage. Android is the open source operating system most diffused, but being an open project, there are many customized versions that run  on mobile devices. Almost every mobile phone manufacturer commercializes its devices with a version of the Android OS that […]

Pierluigi Paganini March 12, 2014
162,000 WordPress instances abused for DDoS attack

Sucuri firm detected a large DDOS attack that leveraged thousands of unsuspecting WordPress websites as indirect amplification vectors. The security community is threatened by a new botnet composed at least 162,000 WordPress-powered websites abused to run DDoS attacks. The technique of attack allows to flood a target with requests sent by WordPress servers that received a […]

Pierluigi Paganini March 12, 2014
Abusing Facebook Access Token with Man-in-the-Middle Attack

The Egyptian penetration tester Ahmed Elsobky discovered a serious flaw that allows attackers to sniff user’s traffic including access token. Facebook is vulnerable to Man-in-the-Middle Attack, The Egyptian penetration tester Ahmed Elsobky discovered a serious flaw that allows attackers to sniff user’s traffic including private information. “We’d actually received an earlier report from another researcher regarding this […]

Pierluigi Paganini March 07, 2014
HTTPS traffic analysis can leak user sensitive data

A Team of US researchers at UC Berkeley conducted a study on the HTTPS traffic analysis of ten widely used HTTPS-secured Web sites with surprising results. User’s privacy is considered a top priority after Snowden‘ revelations on the US surveillance program, recently a couple of cases have shocked IT security community both related to the […]

Pierluigi Paganini March 05, 2014
GnuTLS flaw in certificate verification exposes Linux world to attacks

A serious flaw in the certificate verification process of GnuTLS exposes Linux distros, apps to attack. Another flaw exploitable for surveillance purposes. GnuTLS is an open source secure communications library implementing the SSL, TLS and DTLS protocols, it is used in hundreds of software packages including Red Hat desktop,  all Debian and Ubuntu Linux distributions and many […]