Hacking

Pierluigi Paganini March 16, 2013
NIST – National Vulnerability Database website hacked

The news is curious as it is worrying, unknown hackers have violated the US government repository of standards based vulnerability management website, known as National Vulnerability Database (NVD), last week. The NVD website appears down since last Friday, fortunately while I’m writing is up again, the attackers have compromised at least two servers with a […]

Pierluigi Paganini March 15, 2013
XSS vulnerability in 2shared.com reported by Virus_Hima

The Egyption hacker Virus_Hima hit again, he became famous in the latest months thanks the discovery of Adobe and Yahoo vulnerabilities. This hacker is an example, he supports the research and never tried to sell information on flaws discovered on the undergroud, he is a gray hat from which to learn, so it is for me! […]

Pierluigi Paganini March 12, 2013
Researcher demonstrated serious flaw in Apple App Store

Once again the security of large scale application and platform is challenged, today is the turn of Apple, in particular of its famous Apple store that according the Researchers Elie Bursztein  was vulnerable for more than half year. The developer supported Apple to discovery and fix an important vulnerability that allowed to steal passwords and […]

Pierluigi Paganini March 08, 2013
Brilliant hacker Zatko confirms ending of Cyber Fast Track program

The popular white hat hacker Peiter C. Zatko, aka Mudge, confirms to have ended his experience with the Cyber Fast Track program. The story has begun when one of the most famous US hackers Peiter C. Zatko, also known as Mudge and a member of the hacking group The Cult of the Dead Cow, decided to […]

Pierluigi Paganini March 05, 2013
Java exploit signed with certificate stolen to Bit9

According security experts the numerous cyber attacks that hit principal IT companies, news agencies and government offices exploited zero-day vulnerabilities in Java software to the point that many recommend to uninstall Java plug-in from our browser unless absolutely necessary. Same clamor had obtained in the past the discovery that malware source codes were signed with […]

Pierluigi Paganini March 04, 2013
US retaliation strategy against hackers

The year started very difficult for the U.S. government, its networks have been constantly hit by hackers that for different reasons have tried to steal sensitive information and intelligence secrets. The principal menaces against US come from state-sponsored hackers and hacktivists, in the last months we have read of many cyber attacks, mainly for cyber […]

Pierluigi Paganini March 03, 2013
Evernote hacked, how respond to yet another data breach?

Another noisy attack has alerted IT community, online note service Evernote is the latest firm to get hacked. The company provides the popular service to around 50 million users,  the attackers accessed data of some users such as usernames, passwords and email addresses. Actually there is no evidence that contents in Everynote have been accessed […]

Pierluigi Paganini February 25, 2013
Serious security flaws affect millions of HTC mobile devices

The news of those who make a lot of noise, more than 18 million devices commercialized by Taiwanese company HTC had security flaws that could exposes users to serious risks in particular the bugs could allow the theft of information stored on the mobile and the tracking of user’s location. The vulnerabilities appear serious according […]

Pierluigi Paganini February 23, 2013
Also Microsoft in the club of hacked companies

When Apple revealed the hack to Reuters press agency I wrote that the last big enterprise not yet hacked was Microsoft, anticipating that was question of time. The last events have revealed how much vulnerable also major companies to cyber attacks, Facebook, Twitter and principal Press agencies such as NYT dedicate large investment to cyber […]

Pierluigi Paganini February 22, 2013
Mandiant report links Anonymous 2011 hacks to APT1 campaign

The new is very curious and represents the demonstration that cyber threats could not be analyzed separately, security need a global approach, we cannot distinguish between cybercrime and cyber warfare but we must be focused on the cyber menaces, their effects and the risks connected to adoption of not appropriate security measures. The case is […]