Hacking

Pierluigi Paganini September 25, 2014
Bash Bug is a critical risk to entire Internet infrastructure

Bash Bug is a critical flaw  remotely Exploitable which affects Linux, Unix and Apple Mac OS X and that is threatening the global Internet infrastructure. A new critical vulnerability dubbed Bash Bug in Linux and Unix command-line shell, aka the GNU Bourne Again Shell, is threatening the IT world. The flaw, coded as CVE-2014-6271, is remotely exploitable and affects Linux […]

Pierluigi Paganini September 24, 2014
The iPhone 6 Touch ID fingerprint reader is still vulnerable to hack

Security expert Marc Rogers, chief security researcher at Lookout Mobile Security, revealed that Apple’s Touch ID is still vulnerable to hack on iphone 6. A few days ago we discussed about the availability on the Internet of the exploit for iOS 7.x based devices, due to the diffusion of Apple Smartphones and tablets the security […]

Pierluigi Paganini September 23, 2014
iOS 7_1 exploit for CVE-2014-4377 critical flaw publicly available

Users which haven’t upgraded their systems to the Apple iOS 8 could be victims of a new iOS 7.1 exploit targeting the CVE-2014-4377 vulnerability. Security experts at Binamuse firm have discovered the availability online of the exploit kit which targets the vulnerability coded CVE-2014-4377, a memory corruption issue in iOS’s core graphics library. The exploitation of CVE-2014-4377 could […]

Pierluigi Paganini September 22, 2014
POC – Hacking any eBay Account

THN disclosed details of a critical flaw discovered by the Egyptian researcher ‘Yasser H. Ali’ four months ago, which could be used to hack any eBay account. The Egyptian security researcher ‘Yasser H. Ali’ four months ago reported to the team of the The Hacker News portal a critical vulnerability in eBay system which could be used by […]

Pierluigi Paganini September 20, 2014
Avira – Critical CSRF flaw Vulnerability puts millions users at risk

Egyptian bug hunter discovered that Avira Website is affected by CSRF flaw that allows attackers to hijack users’ accounts and access to their online backup. What do you think about if tell you that an antivirus could represent a menace for your system? Antivirus like any other kind of software could be exploited by threat […]

Pierluigi Paganini September 20, 2014
Yahoo SQL Injection flaw allows Remote Code Execution and privileges scalation

The Egyptian hacker Ebrahim Hegazy has discovered a critical Yahoo SQL Injection flaw exploitable to Remote Code Execution and privilege escalation. My readers know very well the Egyptian hacker Ebrahim Hegazy, he is a great security expert and a friend of mine, which disclosed numerous critical flaws in most popular web services, including Microsoft, Yahoo and Orange. […]

Pierluigi Paganini September 18, 2014
Surveillance – How to secretly track cellphone users position around the globe

Using the proper surveillance systems available on the market it is easy and quick to track cellphone and the movements of targets everywhere on the globe. We recently discussed the decision of Wikileaks to publish copies of the criticized surveillance software FinFisher, highlighting the dangers for the militarization of the cyberspace and in particular for […]

Pierluigi Paganini September 17, 2014
Android Same Origin Policy flaw affects more than 70% devices

A serious flaw vulnerability has been discovered in the default browser on a large number of Android devices that allows to bypass the Same Origin Policy. A critical flaw has been discovered in the Web browser installed by default on the majority of Android mobile devices, it has been estimated that nearly 70 percent of the […]

Pierluigi Paganini September 16, 2014
A critical flaw in Twitter allows to delete payment cards from any account

An Egyptian security researcher has discovered a critical flaw in Twitter platform which allows an attacker to delete credit cards from Any Twitter Account. The Egyptian Security Researcher, Ahmed Mohamed Hassan Aboul-Ela has discovered a critical vulnerability in Twitter’s advertising service that allowed an attacker to delete credit cards from any Twitter account. Ahmed Mohamed Hassan Aboul-Ela […]

Pierluigi Paganini September 15, 2014
Treasure Map – Fiveeyes tap into German telco networks to map end devices

Documents leaked by Snowden reveal the existence of the Treasure Map program run by FiveEyes Intelligence agencies to control the global network. Treasure Map is the name of the last program of intelligence revealed by documents leaked by the whistleblower Edward Snowden. Treasure Map is a program to map every device exposed on the Internet, […]