Hacking

Pierluigi Paganini February 02, 2014
Syrian Electronic Army hacked Ebay and Paypal websites

  Ebay and PayPal hacked by Syrian Electronic Army, “For denying Syrian citizens the ability to purchase online products” said SEA. The group of hackers Syrian Electronic Army (SEA) has monopolized the attention of the media, the hacking team has practically hit every possible target within government organizations, big enterprises and media agencies. The list of […]

Pierluigi Paganini January 31, 2014
Yahoo Mail hacked,attackers gain unauthorized access to its accounts

  The company has issued a security advisory to warn users that Yahoo Mail Service was hacked, hackers have stolen credentials of its email customers. Yahoo Mail! is considered one of the largest email service providers, millions of people use is every day, it’s clear that it represents an attractive target for cyber criminals. The […]

Pierluigi Paganini January 31, 2014
Lack of auth in 3G/4G USB modems exposes control panels to hackers

Andreas Lindh has discovered serious vulnerabilities in an unknown number of 3G/4G USB modems that can be exploited by attackers for spear phishing attacks.  The researcher Andreas Lindh has discovered serious vulnerabilities in an unknown number of 3G and 4G USB modems that can be exploited by attackers to steal user’s credential. The expert has found a Cross Site […]

Pierluigi Paganini January 30, 2014
Exploring the Telephony Denial of Service (TDoS) Q&A

Interviewed with Mark Collier, CTO and VP of Engineering at Securelogix to better understand the topic of Telephony Denial of Service (TDoS). I briefly interviewed Mark Collier, CTO and VP of Engineering at SecureLogix (Www.securelogix.com) on the topic of Telephony Denial of Service (TDoS). Mark just completed the Hacking Exposed: UC and VoIP book, which covers […]

Pierluigi Paganini January 29, 2014
Discovered a serious vulnerability in Mozilla Thunderbird

A serious vulnerability inside Mozilla Thunderbird Gecko engine allows hackers to insert malicious code into Emails to exploit recipient browser. A critical vulnerability affects the email client Mozilla Thunderbird 17.0.6, the popular application has a validation and filter bypass vulnerability that could be exploited by hackers to bypass the filter that prevents HTML tags from being used in […]

Pierluigi Paganini January 28, 2014
Hackers used Spear Phishing attack to hack CNN Blogs

Security analysts at Intelligence firm InterCrawler published the details of the investigation on recent attack against CNN Blogs and social media accounts. Recently a few social media accounts belonging to CNN and blogs were compromised, including CNN’s main Facebook account, CNN Politics’ Facebook account and the Twitter pages for CNN and CNN’s Security Clearance. At the […]

Pierluigi Paganini January 27, 2014
Israeli Defense computer hacked via spear phishing attack

Aviv Raff, CTO at Seculert, confirmed that the attackers have penetrated into the network of Israeli Defense accessing to 15 computers. Israeli Defense is another illustrious victim of spear phishing attack, just on Friday Microsoft suffered a similar attack and attackers breached the email accounts of its staff accessing to documents on law enforcement inquiries. Reuters agency […]

Pierluigi Paganini January 26, 2014
Discovered a Remote Command Execution Vulnerability in Yahoo!

The cyber security expert Ebrahim Hegazy has found a Remote Code Execution vulnerability in a Yahoo server hosting numerous sub-domains. The cyber security expert Ebrahim Hegazy has found a serious flaw, as explained by the analyst the website is affected by a Remote Code Execution vulnerability. During the test Hegazy discovered first a Remote PHP Code […]

Pierluigi Paganini January 26, 2014
Spear phishing against Microsoft, exposed law enforcement inquiries

Attackers breached the email accounts of Microsoft staff, probably with a spear phishing attack, accessing to documents on law enforcement inquiries. Spear phishing attacks are within most insidious attacks for private companies and organizations, they are primarily caused for data breach occurred in the last couple of years. Despite the awareness of this type of cyber […]

Pierluigi Paganini January 25, 2014
100 lines of code to Hack new Snapchat people verification

100 lines of code could hack new Snapchat people verification feature that displays nine images and requests new user to select the one containing a ghost. Snapchat is considered by many security experts a case study on how a lack of security by design could hit a large community of users impacting their privacy, a few […]