Hacking

Pierluigi Paganini February 22, 2015
PowerSpy – How to spy on mobile users by monitoring the power supply

A group of researchers has proposed a new technique dubbed PowerSpy to track mobile users’ location by analyzing data related to the power supply. A group of researchers at Stanford University and the Israeli defense company Rafael has discovered a way to track mobile devices by analyzing the power supply. The experts have proposed a technique […]

Pierluigi Paganini February 21, 2015
Verisign report – The rise of DDoS attacks as a service

A new report published by Verisign provides useful data related to the recent evolution of DDoS attacks and the services that offer them. DDoS attacks are even more dangerous for every organization that exposes its resources and services on the Internet, recent attacks against Sony PSN network and XBox live service demonstrate it. DDoS attacks despite […]

Pierluigi Paganini February 21, 2015
Shodan Founder finds 250,000 routers sharing same SSH keys

The Founder of Shodan John Matherly was revamping the SSH banner when discovered a large number of devices that share same SSH keys. The Founder of Shodan, John Matherly, has conducted in December 2014 a personal research discovering that more than 250,000 routers used in Spain and deployed by Telefonica de Espana, and thousands more used in other […]

Pierluigi Paganini February 20, 2015
“TNT” gang has released a new hardware TDoS tool in the criminal underground

Telephone DDoS attacks are on the rise, the  criminal group known as “TNT” gang has released a new hardware tool in the underground ecosystem. The IntelCrawler cyber threat intelligence company has discovered a new advanced tool, dubbed ‘TNT Instant Up’, for Telephone Denial of Service attacks (TDoS). TDoS is a common practice in the criminal underground, it consists in flooding […]

Pierluigi Paganini February 20, 2015
Great SIM Heist – docs reveal mass cell phone hack by Five Eyes intelligence

US and British intelligence services have stolen encryption keys of the major SIM card maker Gemalto to spy on mobile voice and data communications worldwide. A new report published by The Intercept reveals that the National Security Agency and the British counterpart GCHQ obtained encryption keys of the global SIM manufacturer Gemalto, but the company […]

Pierluigi Paganini February 19, 2015
Superfish adware in the Lenovo laptops is a threat to the users

The presence of the Superfish software in Lenovo laptops exposes the users to serious risks of hacking. The researcher Graham explained the reason. The news of the presence of Superfish adware in the laptops sold by the Chinese Lenovo has shocked the IT industry. The company has intentionally pre-installed a malware on laptops, but which are the […]

Pierluigi Paganini February 19, 2015
Serious flaws allowed the deletion of any comment on Facebook

A young hacker disclosed the details of an attack that by exploiting a couple of flaws in Facebook allowed him to delete any comment on the social network. The 19-year-old hacker Joe Balhis has discovered the way to delete any comment on Facebook by leveraging a session validation flaw and a cross-site request forgery (CSRF) vulnerability. The expert highlighted that […]

Pierluigi Paganini February 19, 2015
Arid Viper – Israel entities targeted by malware packaged with sex video

Attackers behind the Arid Viper and the Yanbian Gang exploited sex  content for their campaigns against victims in Israel and Kuwait, and South Korea. Security experts at Trend Micro have uncovered a cyber espionage campaign, dubbed Operation Arid Viper, that targeted Israeli institutions. The Operation Arid Viper is run by Arab-speaking hackers that sought to extract […]

Pierluigi Paganini February 18, 2015
25 billion Cyberattacks hit systems in Japan during 2014

The National Institute of Information and Communications Technology revealed that more than 25 billion cyberattacks hit  systems in Japan during 2014. I decided to write this post to highlight the importance of a cybersecurity posture for any government. When the majority of people thinks to cybersecurity, has no idea of principal cyber threats and their […]

Pierluigi Paganini February 18, 2015
BadUSB attack and the Industrial control systems

Industrial control systems are in danger of being hacked by using a modified version of the BadUSB attack says Michael Toecker in his presentation at the Security Analyst Summit 2015 in Cancun. Not that long ago, BadUSB swept across the cybersecurity community as one of the hottest hacks of the year. BadUSB featured the ability […]