Hacking

Pierluigi Paganini March 23, 2014
IntelCrawler profiled Syrian Electronic Army group

The intelligence firm IntelCrawler has published a report on the activities of the Syrian Electronic Army. Are they hacktivists or cyber spies? IntelCrawler, a cyber-threat intelligence company has recently issued an interesting report on the activities of the Syrian Electronic Army (SEA), the experts analyzed a series of event since since its first appearance in […]

Pierluigi Paganini March 21, 2014
SEA has stolen invoices that shows Microsoft charges FBI for user data

A collection of emails hacked by the group Syrian Electronic Army shows that Microsoft charges the FBI’s Digital Intercept Technology Unit for user data. No more than a week ago hackers of the group Syrian Electronic Army (SEA) published online documents leaked from US CENTCOM repository, now the pro President Bashar al-Assad sad hacking team successfully penetrated […]

Pierluigi Paganini March 21, 2014
For Google it is time to encrypt all GMail connections

Google has announced to have adopted encrypt mechanisms for all Gmail connections to reply to the increasing demand of privacy of Internet users. Google decided to encrypt all Gmail connections to reply to the increasing demand of privacy of Internet users, all the links between its data centers will be encrypted. The surveillance programs disclosed by documents leaked […]

Pierluigi Paganini March 18, 2014
Google Public DNS Server Traffic Hijacked, Millions users impacted

Google DNS public server was hijacked yesterday for 22 minutes, the victims were hijacked to the Latin America division of BT in Venezuela and Brazil. Google is undoubtedly the main targets for hackers, its services are accessed daily by billions of Internet users, a wide audience desirable for attackers. The last successfully attack against Google […]

Pierluigi Paganini March 17, 2014
QUANTUMHAND – NSA impersonates Facebook to inject malware

Recent revelations on TURBINE platform include also a disturbing truth, NSA used QUANTUMHAND exploits to implant malware in Facebook users’ machines. Last Week Ryan Gallagher and Glenn Greenwald revealed the existence of TURBINE platform, a sophisticated hacking architecture used to take control of botnet C&C servers managed by cybercrime. One of the details revealed by the journalists raised a heated […]

Pierluigi Paganini March 15, 2014
Syrian Electronic Army hacked the US CENTCOM

Syrian Electronic Army hacked the US CENTCOM and it is threatening to leak secret documents due US decision to hit Syria with electronic warfare attacks. Syrian Electronic Army (SEA) is the group of hackers that most of all is threatening the giants of the IT industry and media, the list of victims is very long (Facebook, Microsoft, NYT, […]

Pierluigi Paganini March 14, 2014
WhatsApp flaw allows hackers to steal private Chats on Android devices

A security consultant disclosed a security flaw in WhatsApp which can be exploited to gain access to the private chats of Android device owners.    The recent acquisition of WhatsApp by Facebook has done much to discuss, ever a price so high was paid for an app, but major concerns relate to users’ privacy. The security consultant Bas Bosschert […]

Pierluigi Paganini March 13, 2014
Samsung Galaxy backdoor allows files access on the mobile’s storage

Replicant developers Kocialkowski has discovered a backdoor inside Samsung Galaxy which allows file access on the mobile’s storage. Android is the open source operating system most diffused, but being an open project, there are many customized versions that run  on mobile devices. Almost every mobile phone manufacturer commercializes its devices with a version of the Android OS that […]

Pierluigi Paganini March 12, 2014
162,000 WordPress instances abused for DDoS attack

Sucuri firm detected a large DDOS attack that leveraged thousands of unsuspecting WordPress websites as indirect amplification vectors. The security community is threatened by a new botnet composed at least 162,000 WordPress-powered websites abused to run DDoS attacks. The technique of attack allows to flood a target with requests sent by WordPress servers that received a […]

Pierluigi Paganini March 12, 2014
Abusing Facebook Access Token with Man-in-the-Middle Attack

The Egyptian penetration tester Ahmed Elsobky discovered a serious flaw that allows attackers to sniff user’s traffic including access token. Facebook is vulnerable to Man-in-the-Middle Attack, The Egyptian penetration tester Ahmed Elsobky discovered a serious flaw that allows attackers to sniff user’s traffic including private information. “We’d actually received an earlier report from another researcher regarding this […]