Hacking

Pierluigi Paganini May 09, 2014
Alleged members of hacking Team Digi7al arrested for violating government networks

Alleged members of the hacking Team Digi7al were arrested by NCIS and charged for Hacking more than 30 government and private sites. The US attorney’s Office in Tulsa charged two men for involvement in anti government conspiracy, they are accused to have violated the computer systems of dozens of government and commercial organizations, including the […]

Pierluigi Paganini May 09, 2014
NTLM flaws exploitation to access resources in corporate networks

Experts at Imperva have illustrated how to exploit NTLM flaws to conduct a Windows folder Poisoning Attack and steal access rights within corporate networks. Security vendor Imperva revealed that attackers can exploit specifically crafted shortcut icons to hack Windows machines and force them into sharing their network-access rights with a hacked PC. The experts at Imperva  have discovered […]

Pierluigi Paganini May 08, 2014
Spy Plane Scrambled Air Traffic Control in Southern California

FAA confirmed that its air traffic system experienced problems while processing a flight plan filed for a U-2 spy plane that operates in Southern California. In the past, we had a long discussed on new cyber warfare scenarios, the conflicts in the cyberspace have many faces, we saw sophisticated hacking platforms like the NSA FOXACID […]

Pierluigi Paganini May 06, 2014
Steganography to hide secret messages in user’s tweets

Discover how it is possible to apply steganography to hide secret messages in common tweets (or any text) with steg.js-of-the-dump. In the past we have discussed many times on the adoption of steganography to hide messages within images and video, a technique exploited also by authors of malware to hide configuration file and command sent by the C&C […]

Pierluigi Paganini May 05, 2014
DNS Protocol affected by a serious flaw, Internet users are at risk

Technion students Find a security vulnerability in the Internet DNS protocol which allows the attackers to redirect users to a  website they control. A significant new security vulnerability has been found in the DNS protocol by a group of Israeli students from the Technion’s Department of Computer Sciences. After the Heartbleed case and the assumptions […]

Pierluigi Paganini May 04, 2014
Using lnk file to deceive users in phishing attacks

Expert at Trustwave explained the tactics adopted by cyber criminals how to serve malware in phishing attacks exploiting  .lnk files. Phil Hay, expert at Trustwave SpiderLab, explained how cyber criminals  are using .lnk files to serve malware via email. I have chosen to detail this tactic to demonstrate how much creative is the criminal ecosystem, even if it […]

Pierluigi Paganini May 03, 2014
Understanding Hit and Run DDoS attacks

Hit and Run DDoS attacks are composed by a series of short bursts of high volume attacks, having a limited duration, and are arranged periodically, and … Incapsula firm has recently published a blog post to explain the efficiency of hit and run DDoS attacks, as remarked by the experts attackers don’t need to arrange large scale […]

Pierluigi Paganini May 02, 2014
Vishing is still alive and a malicious campaign is scaring banking

Security Experts at PhishLabs revealed that a vishing campaign targeted banking industry to harvest credit/debit card data from customers. The security firm PhishLabs revealed that numerous US banks are victims of a recent Vishing (VoIP-based phishing) campaign that is targeting the payment card information of up to 250 Americans per day. Assuming that the withdrawal limits on ATM […]

Pierluigi Paganini May 01, 2014
Facebook scammers exploit your intention to hack friends’ account

Security Experts at Symantec discovered scammers are exploiting Facebook users’ intention to hack friends’ account to compromise their profile. Symantec has discovered a new insidious scam against Facebook users, scammers targeted the social media users proposing a bogus Facebook hacking tool that promises to give the access to their friends’ accounts … unfortunately the unique account hacked is the […]

Pierluigi Paganini May 01, 2014
Hacking Traffic lights and other control systems is not so hard

Security experts Cesar Cerrudo conducted a study on the security of components within control traffic lights and similar electronic systems. The hacking of control systems for traffic lights or cyber grids is a prerogative of sci-fi series and movies, hackers could be able to target them causing serious problems. Cesar Cerrudo, CTO at IOActive, has conducted a study to investigate […]