Hacking

Pierluigi Paganini July 12, 2014
Gmail App for iOS vulnerable to Man-in-the-Middle Attacks

Security experts at Lacoon discovered a vulnerability in the Gmail iOS app which enables a bad actor to perform a Man-in-the-Middle. Google Gmail application for iOS is exposed to risks of  Man-in-the-Middle (MitM) attacks which allow bad actors to monitor encrypted email communications. An expert at mobile security firm Lacoon has discovered that version of Gmail […]

Pierluigi Paganini July 11, 2014
Chinese hackers violated systems at the Office of Personnel Management

The New York Times revealed that in March Chinese hackers hacked systems at Office of Personnel Management stealing files of thousands of  Federal employees According to the New York Times, senior American officials revealed that a group of Chinese hackers violated the computer networks of the United States government agency in March. The Chinese bad actors hacked US government systems […]

Pierluigi Paganini July 09, 2014
Hacking LIFX Smart LED Light bulbs to steal WiFi Passwords

Context Information Security firm has discovered a security vulnerability in LIFX smart LED light bulbs that can be remotely controlled by mobile devices. Researchers at Context Information Security have discovered a security flaw in a WiFi enabled, smart LED light LIFX bulb that can be remotely controlled via mobile devices. The discovery was the result of a […]

Pierluigi Paganini July 08, 2014
Netgear GS108PE Switches contain hard-coded login credentials

A vulnerability analyst at CERT/CC reported a security issue in Netgear GS108PE Prosafe Plus Switch which contains hard-coded login credentials. The CERT/CC has recently issued an alert for the presence of hard-coded login credentials in the Netgear GS108PE Prosafe Plus Switch (Vulnerability Note VU#143740). An attacker could exploit the security issue in the Netgear GS108PE Prosafe Plus Switch […]

Pierluigi Paganini July 06, 2014
Hackers can break Tor Network Anonimity with USD 3000

Security experts Alexander Volynkin and Michael McCord will present at the next Black Hat 2014 a method to break Tor network anonymity with just USD 3000. Is the popular Tor network broken? In the recent months, after the Showden’s revelations, many security experts have started to investigate on the possibility that the US intelligence, and […]

Pierluigi Paganini July 05, 2014
Facebook SDK flaw exposes smartphone users’ accounts at risk

Experts from MetaIntell have discovered a critical vulnerability in the latest version of Facebook SDK which exposes millions of Facebook accounts at risk. Security experts from MetaIntell have discovered a significant security vulnerability in the latest version of Facebook SDK, which affects numerous iOS and Android apps exposing millions of Facebook user’s Authentication Tokens at risk. The researchers […]

Pierluigi Paganini July 01, 2014
Kaspersky Lab reveals an increase in RDP bruteforce attacks

Security experts at Kaspersky Lab have issued data related to the number of RDP brute force attacks on its clients which show a worrying trend. In the June Kaspersky Lab has included in its products an Intrusion Detection System, which allowed the company to analyze  more information on going attacks on its clients. Kaspersky has issued the data […]

Pierluigi Paganini June 30, 2014
OpNO2ISIS Anonymous will attack states supporting ISIS group

Anonymous has announced the campaign dubbed Operation NO2ISIS against some states it accuses of supporting the Islamic terror group ISIS. The group of hacktivists Anonymous has announced a new campaign dubbed Operation NO2ISIS against some nations it accuses of funding or arming the radical Islamic terror group ISIS. In particular Anonymous will target three states suspected of […]

Pierluigi Paganini June 28, 2014
Android 4.3 and Earlier affected by Critical Code-Execution Flaw

A serious code-execution vulnerability in Android 4.3 and earlier was patched with latest KitKat Android Operating System version. Are you using the Android 4.3 version and you are convinced to be secure? You are unfortunately wrong, because this version of Android and earlier are affected by a critical code-execution vulnerability. According to data proposed by the Android […]

Pierluigi Paganini June 26, 2014
Critical flaw in TimThumb plugin menaces the WordPress world

A critical vulnerability in the WebShot feature implemented by TimThumb plugin expose WordPress instance to Remote Code Execution attacks. The popular image resizing library TimThumb used in many WordPress themes, 3rd party components and plugins is affected by a critical vulnerability which allows an attacker for certain commands to be remotely executed, without authentication, on the vulnerable website. The discovery of the […]