Hacking

Pierluigi Paganini July 28, 2014
Instagram Adroid App affected by account session Hijacking flaw

A security researcher disclosed a serious issue on Instagram’s Android Application which could be exploited by an attacker to impersonate a victim. A security issue related to Instagram Mobile App for Android expose the users’ account to serious risks of data breach. A security researcher discovered that the Instagram Mobile App is affected by a Hijacking vulnerability which could be […]

Pierluigi Paganini July 28, 2014
Hackers exploit cloud services to build Money-Mining Botnet

Two security experts will present at the next BlackHat conference how to exploit cloud services to build Money-Mining Botnet. Cloud computing is becoming the paradigm most abused by cybercrime, cloud architectures represent privileged targets of cyber criminals that desire to steal data they contain or to abuse their resources to conduct cyber attacks. Two researchers, Rob […]

Pierluigi Paganini July 27, 2014
European Central Bank victim of an attempt of cyber extortion

Hackers steal user contact information and other data from a database of the European Central Bank website in an attempt of extortion. Financial institutions are under attack, the number of cyber attacks against banking industry is increasing constantly, last malicious campaign discovered in order of time is the Operation Emmental. A few days ago, bad […]

Pierluigi Paganini July 26, 2014
Russian Government issued a Tender to crack Tor

The Russian government has launched a public competition, reserved to Russian entities, offering $111,000 to break Tor encryption. As anticipated in my previous post, law enforcement agencies and intelligence all over the world are investing to de-anonymize users in the deepweb, and in particular on Tor networks. Hacking Tor is a goal for many Intelligence agencies as […]

Pierluigi Paganini July 26, 2014
Tor Project is working to fix the alleged critical bug discovered by researchers at Carnegie Mellon

The co-creator of the Tor network confirmed that the Tor Project team is working to identify and fix the bug announced by researchers at Carnegie Mellon. Tor network is a system designed to anonymize user’s experience on the web, allowing the publishing of content in the part of web non indexed by search engines, dubbed DeepWeb. A […]

Pierluigi Paganini July 25, 2014
Fake Googlebots used to run application-layer DDoS

Security experts at Incapsula are observing a surge in the used of fake Googlebots to launch and carry out application-layer DDoS. Googlebots crawl websites are the software used to index and rank the content of websites for the popular search engine. It’s not a mystery that the visits of Googlebots are not considered a possible indicator […]

Pierluigi Paganini July 24, 2014
Thousands of WordPress Sites hacker through MailPoet flaw

Security experts at Sucuri form have observed a surge of cyber attacks against WordPress website which are using not updated version of MailPoet plugin. A large scale attack has hit more than 50,000 websites, the attacker exploited a recently patched vulnerability in a popular plugin for the WordPress CMS. Early July, experts at security firm Sucuri discovered […]

Pierluigi Paganini July 24, 2014
Tails live OS affected by critical zero-day vulnerabilities … Exodux disclosed the details

A researchers at the Exodus Intelligence firm has discovered a series of zero day vulnerabilities in the popular Tails Linux-based distribution. A researcher at Exodus Intelligence has discovered critical zero-day vulnerabilities in the popular Tails live operating system. Tails is considered by security experts an indispensable tool to preserve the privacy and security of users that intend to […]

Pierluigi Paganini July 23, 2014
Indexeus, the search engine which menaced hacking community

Indexeus is a new search engine that indexes user account information acquired from data breaches, including hackers’ accounts stolen in the underground. A new search engine for underground hacking dubbed Indexeus has been launched, it retrieves all the available information on user account acquired from hundreds recently data data breaches. The data collected includes information on malicious hackers […]

Pierluigi Paganini July 22, 2014
Hidden services in iOS devices could allow users’ surveillance

Apple has worked hard to make iOS devices reasonably secure but hidden services could be exploited to steal every user’s data in a stealthy way. Have you tried to enumerate the functionalities and services in your Apple iOS? You’d be surprised to find that numerous hidden features and services are not documented, some of them […]