Hacking

Pierluigi Paganini August 17, 2015
Antivirus industry damaged by the Kaspersky’case

Kaspersky sustains the Reuters’s story on Antivirus false positives is based on information provided by anonymous former KL employees which are not reliable Some days ago, Reuters published a story about Kaspersky revealing that the Russian company was creating malicious codes to give them an upper hand against their direct competitors. Eugene Kaspersky in the […]

Pierluigi Paganini August 17, 2015
Exploiting BitTorrent flaws to run Distributed Reflective DDoS

Security researchers discovered a new technique to exploit BitTorrent to run powerful DDoS amplification attacks that could bring down great websites. A weaknesses in the open BitTorrent protocol makes some of the most widely used BitTorrent applications, including uTorrent, Mainline, and Vuze vulnerable to a form of denial of service attack. The form of DDoS […]

Pierluigi Paganini August 17, 2015
The OwnStar Attack also works with BMW, Chrysler, Mercedes Cars apps

While the Ownstar attack has been fixed by GM, the same flaw affects also BMW Remote, Mercedes-Benz mbrace, and Chrysler Uconnect apps. Recently I wrote about the OwnStar attack presented by the popular hacker Samy Kamkar, a new gadget designed by the expert that could be exploited to hack GM Cars. The tool developed by Kamkar allows to locate […]

Pierluigi Paganini August 16, 2015
Security Affairs newsletter Round 22 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. ZigBee-sniffing drone used to map online Internet of Things RollJam, a $30 device to unlock the majority of car doors Tesla tech top dog downs slug of Scotch, increases […]

Pierluigi Paganini August 16, 2015
How to hack a Parrot drone on the fly

Two security researchers at the recent Def Con conference presented the results of their studies on hacking Parrot drones.  Their findings are surprising. At the recent Def Con conference in Las Vegas, security experts demonstrated in two different talks how to exploit vulnerabilities in commercial drones manufactured by Parrot. In one of the attacks, the […]

Pierluigi Paganini August 15, 2015
Zero-Day in the Google Admin App can bypass Android sandbox

MWR Labs have disclosed information on an unpatched vulnerability that allows an attacker to easily bypass the Android sandbox. Other problems for the popular Android OS, after the discovery of the Stagefright vulnerabilities and other security flaws recently revealed by security researchers, now experts at MWR Labs have disclosed information on an unpatched vulnerability that allows […]

Pierluigi Paganini August 13, 2015
Cisco warns hackers are installing malicious ROMMON images on its devices

Cisco is warning enterprise customers about a spike in attacks in which hackers use valid admin credentials on IOS devices to install bogus ROMMON images. Be aware network administrators, Cisco released a new Security Activity Bulletin referring a spike in attacks in which hackers use valid credentials on IOS devices to log in as administrators […]

Pierluigi Paganini August 13, 2015
Yet malicious software found on Lenovo PCs

Chinese computer manufacturers Lenovo has been caught once again using a hidden Windows feature to preinstall unwanted and unremovable rootkit. Lenovo firm was accused several times to supplying equipment for networks of the intelligence and defense services various countries that allowed the Chinese Government to run espionage operations. In 2013, Spy agencies reportedly have a long-standing […]

Pierluigi Paganini August 13, 2015
Hack Satellite Connection and Surf Anonymously with High-speed Internet

A Spanish-based security analyst demonstrated new satellite capturing traps that could allow to surf anonymously with High-speed Internet. Digital signals can be conveyed to certain places by satellites where the Internet appears like a wonder: off-the-network desert sunlight based homesteads, the Arctic or a plane carrying warship adrift. Be that as it may, in radiating […]

Pierluigi Paganini August 12, 2015
Attackers exploit a Windows flaw using a booby-trapped USB

Microsoft announced in the Tuesday’s bulletin that crooks have been exploiting a vulnerability that allows to execute malicious code using booby-trapped USB Microsoft announced in the last Tuesday’s bulletin that crooks have been exploiting a vulnerability that allows to execute malicious code using booby-trapped USB. The vulnerability affects all supported versions of Windows OS as […]