Hacking

Pierluigi Paganini August 06, 2014
Security flaw allows to bypass PayPal two-factor authentication

A Security researcher has discovered a new flaw in the two-factor authentication process implemented by PayPal to protect its users. Security researcher Joshua Rogers has discovered a simple way of bypassing the two-factor authentication mechanism implemented by PayPal to protect accounts that are linked to eBay accounts. The flaw resides in the login process when a user is prompted […]

Pierluigi Paganini August 05, 2014
Hacking satellite communications equipment on passenger jets

Cyber security expert claims to be able access satellite communications equipment on passenger jets through their WiFi and in-flight entertainment systems. Airplanes Can Be Hacked Through Wireless In-flight Entertainment System, this is not a new discovery as I explained in a post published more that one year ago and titled “Cyber Threats against the Aviation […]

Pierluigi Paganini August 04, 2014
Tens of thousands of Mozilla developers emails and password exposed

Mozilla Security Team announced the accidental disclosure of MDN email addresses of about 76,000 users and encrypted passwords of about 4,000 users. Bad news for tens of thousands of Mozilla developers, their email addresses and encrypted passwords were accidentally exposed. The news was reported in blog post published on the official Mozilla Security Blog, the risk is […]

Pierluigi Paganini August 01, 2014
OpSaveGaza , Anonymous paralized Mossad website with a DDoS

Members of the group of hacktivists Anonymous have coordinated a major Distributed Denial of Service attack early this morning as part of the #OpSaveGaza. Anonymous, the popular collective of hacktivists, has taken down the official website of the Israeli intelligence agency Mossad as announced through a tweet from one of its numerous accounts. Obviously the collective […]

Pierluigi Paganini August 01, 2014
Hackers can exploit USB devices to trigger undetectable attacks

A popular security researcher revealed that bad actors can tap into USB Devices to conduct attacks non detectable with known security defenses. Security experts demonstrated that USB devices can be used to compromise personal computers in a potential new type of attacks that evade all actual security protections. Karsten Nohl, chief scientist with Berlin’s SR Labs, discovered that […]

Pierluigi Paganini July 31, 2014
Zero-day flaws affect Symantec Endpoint Protection

Pen Testers at Offensive Security discovered Zero-day flaws in Symantec Endpoint Protection that could be exploited to gain full system access. Yesterday I reported the results of the study conducted by the security researcher Joxean Koret which publicly revealed a series of flaws affecting 14 of 17 major antivirus engines. The security experts remarked that antivirus products are […]

Pierluigi Paganini July 31, 2014
Discovered attacks to compromise TOR Network and De-Anonymize users

On July 4 2014 Tor Team discovered a group of malicious relays that they assume were trying to deanonymize Tor Network users with confirmation attack technique. Tor network is an excellent technology to ensure users’ online anonymity, thanks to the Tor network users can hide online activities, staying far from the prying eyes of governments and […]

Pierluigi Paganini July 30, 2014
Serious security issues affect 14 of 17 major antivirus engines

Joxean Koret, a security researcher at Singapore-based consultancy COSEINC, has publicly revealed a series of flaws which affect major antivirus engines. The security researcher at Singapore-based consultancy COSEINC, Joxean Koret, has discovered different flaws in 14 of 17 major antivirus engines. The researcher has presented the results of his study (PDF) at the recent SyScan 360 security conference in […]

Pierluigi Paganini July 30, 2014
Millions of Android devices exposed to fake ID flaw

Android devices are affected by a critical vulnerability which allows a malicious app to impersonate a trusted application inheriting its permissions. Researchers at Bluebox Security have discovered a critical vulnerability in millions of Android devices that allow a malicious app to impersonate a trusted application in a stealthy way, allowing a bad actor an attacker to perform different malicious actions. […]

Pierluigi Paganini July 29, 2014
seL4, Hack-proof DARPA-derived micro kernel goes open source tomorrow

DARPA-derived secure micro kernel seL4 goes open source tomorrow, it is the a first prototype mathematically proven and hacker-repelling software. The National ICT Australia (NICTA) has completed the development of the first micro kernel mathematically proven seL4 to be bug free, its  project will be released as open source tomorrow and could be deployed on drones to prevent hacking. The formal-methods-based […]