Security

Pierluigi Paganini August 07, 2015
Hackers are targeting Gas Tanks worldwide

Security experts from Trend Micro have set up a number of honeypot to study the cyber attacks on vulnerable gas tanks and worldwide. Security researchers at Trend Micro, Kyle Wilhoit and Stephen Hilt have discovered a number of cyber attacks attempting to hack and shut down gas tanks. The researchers have set up honeypots to study […]

Pierluigi Paganini August 07, 2015
Hacking Team compromised non-jailbroken iOS devices

Security experts from FireEye demonstrated that Hacking Team leveraged iOS vulnerability to install fake messaging apps implementing a Masque Attack. Another news related with the leak of the Hacking Team‘s hack, this time it was discovered that Hacking Team was capable of compromising IOS devices, even if they weren’t jailbroken. To accomplish this, Hacking Team […]

Pierluigi Paganini August 07, 2015
Tesla Motor sent a patch to fix flaws in its connected car

Tesla Motors Inc admitted to have sent an update to patch security vulnerabilities discovered by a couple of cyber security experts. Tesla Motors Inc has announced that it has distributed a software update to fix security vulnerabilities in the Tesla Model S sedan. According to the company an attacker by exploiting the flaw could take […]

Pierluigi Paganini August 03, 2015
FDA says healthcare providers to stop using older drug infusion pumps made by Hospira

Food and Drug Administration invited healthcare providers to stop using older drug infusion pumps made by Hospira due to the risk of cyber attacks. A few months ago security experts highlighted the risks related to the hacking of older drug infusion pumps, we discovered that certain versions of common drug infusion pumps are affected by numerous […]

Pierluigi Paganini August 03, 2015
Hijacking Satellite Communications with a $1,000 Device

A security researcher demonstrated how to hack a satellite tracking technology with a $1,000 device made of off the shelf components. Colby Moore, a security expert from security firm Synack, will present in a talk at the next Black Hat Conference how to hack satellite tracking technology by using a $1,000 device made of off […]

Pierluigi Paganini August 02, 2015
Operation Potao – hackers used a trojanized version of TrueCrypt

ESET issued a report on a cyber espionage campaign dubbed Operation Potao that relied on the diffusion of a trojanized Russian language version of TrueCrypt. Despite TrueCrypt development was mysteriously interrupted last year, the popular open-source encryption tool still represents the ideal choice for individuals that need to encrypt their data. Recently ESET published an interesting report […]

Pierluigi Paganini August 02, 2015
Microsoft Windows 10 spies on you by default

While Microsoft is offering for free it new Windows 10 OS, security experts argue that the cost for user privacy is much higher. Microsoft Windows 10 is the new operating system of the IT giant, the newborn already reached more than 14 million downloads in just two days. The experts who have already analyzed Windows 10 […]

Pierluigi Paganini August 02, 2015
Hacking Industrial Ethernet Switches to take over nuclear plants

Hackers can exploit the vulnerabilities affecting Industrial Ethernet Switches and take control over Nuclear Power Plants and other critical infrastructure. The increasing number of incidents occurred in these years demonstrated that a cyber attack could cause serious damage to industrial processes. It is enough that hackers find and exploit a simple vulnerabilities in one of […]

Pierluigi Paganini August 01, 2015
A new flaw in BIND is threatening the Internet’ core

A new vulnerability affects Bind, the open-source software that implements the Domain Name System (DNS) protocols for the Internet. BIND is used by servers for translating human-friendly domain names into IP addresses. This vulnerability could be exploited by a  lone hacker to bring down swaths of the Internet. The problem affects all the major versions […]

Pierluigi Paganini July 30, 2015
BLEkey – How to Clone RFID cards with a $10 device

Accuvant researchers will be releasing an open source piece of hardware dubbed BLEkey that can be used to circumvent these RFID card readers. Do you require to pass a card into a device to enter in your company’s office?  Most probably you are using a card based on Radio-Frequency Identification (RFID) technology to grant the […]