Hacking

Pierluigi Paganini February 02, 2015
BMW fixes security flaw in 2.2 million car software

A security vulnerability in the BMW Connected Drive system allowed security experts to send remote unlocking instructions to the cars. Modern cars are complex systems composed of several components interconnected by internal networks, each system within these architectures is exposed to the risk of cyber attacks. Recently the German carmaker BMW has fixed a security […]

Pierluigi Paganini February 01, 2015
Three credit card transactions could reveal your identity

A recent study on the use of metadata to de-anonymize users revealed that three credit card transactions could reveal your identity. Privacy is the great utopia of a society based on the technology, every action we make leaves a track that could be used to reveal our identity, track our profile and monitor our habits. We have […]

Pierluigi Paganini January 31, 2015
Hacking sex toys and dolls

The security expert Ken Munro has run a series of penetration tests on sex toys and dolls for children … the results are disconcerting. Everything that could be connected to a computer could be potentially exploited to hack it, we read about several cases that demonstrated how it is possible to compromise a PC by […]

Pierluigi Paganini January 31, 2015
PHP Applications and WordPress exposed to the Ghost flaw

PHP applications and WordPress CMS might be affected by the GHOST vulnerability that could be exploit to compromise the hosting servers. The critical GHOST vulnerability (CVE-2015-0235) in the GNU C library (glibc) may have a greater impact than imagined, security experts have discovered that PHP applications, including the popular WordPress Content Management System (CMS), could also […]

Pierluigi Paganini January 29, 2015
WhatsApp Web client and Mobile App affected by privacy issues

The 17-year-old security researcher Indrajeet Bhuyan discovered two security flaws in the newborn WhatsApp Web client which menace user privacy. Just a week after the presentation of WhatsApp Web, the desktop version of the popular mobile messaging application WhatsApp, a 17-year-old security researcher Indrajeet Bhuyan discovered two security flaws. Bhuyan is already known to the IT security community because […]

Pierluigi Paganini January 29, 2015
Critical DNS hijacking flaw affects D-Link DSL router

Critical DNS hijacking flaw affects D-Link DSL router, the flaw affects the ZynOS firmware that is used also by other vendors, including TP-Link and ZTE. A security vulnerability affects DSL router model from D-Link, the flaw could be exploited by a remote attacker to change device DNS settings and hijack users’ traffic. The Bulgarian security […]

Pierluigi Paganini January 27, 2015
Reading the ENISA Threat Landscape 2014 report

The European Union Agency for Network and Information Security has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.” The European Union Agency for Network and Information Security (ENISA) has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.” This ENISA Threat Landscape 2014 report (ETL 2014) was prepared […]

Pierluigi Paganini January 27, 2015
A hacker developed Maldrone, the first malware for drones

Security expert Rahul Sasi has discovered and exploited a backdoor in Parrot AR Drones that allows him to remotely hijack the UAV with the malware Maldrone. The diffusion of drones is alerting government and authorities, small Unmanned Aerial Vehicles (UAVs) are used more frequently in different sectors. The security of drones in both military and […]

Pierluigi Paganini January 27, 2015
Lizard Squad claims to have brought down both Facebook and Instagram

Both social network platforms Facebook and Instagram went down on Tuesday while Lizard Squad hacking team claims responsibility for an alleged DDoS attack. A couple of the most popular social networks Facebook and Instagram went down for at least 40 minutes on Tuesday, the official motivation is a technical outage, but the popular hacking crew Lizard Squad claims to have […]

Pierluigi Paganini January 27, 2015
AT&T short codes exposes users to phishing scams

Computer programmer Dani Grant revealed that short codes from AT&T are easy to spoof and expose customers to phishing scams. AT&T customers are exposed phishing attacks due to proprietary AT&T’s text protocols. Computer programmer Dani Grant discovered that is quite easy to spoof text messages from AT&T. In this variant of “Phishing” attacks, crooks attempt to trick victims […]