Security

Pierluigi Paganini August 29, 2014
Google Dorking is a threat to Gov sensitive data according to a Feds memo

FBI and National Counterterrorism Center issued a memo to warn Government agencies on the risks related to Google Dorking on their websites. On July 7th, the FBI and the National Counterterrorism Center issued a memo to warn law enforcement and private security agencies about the practice of Google Dorking  and its capabilities. The FBI warns the recipients […]

Pierluigi Paganini August 29, 2014
Major cyber attacks hit 5 US banks including JPMorgan

US law enforcement and private security firms are investigating on a series of cyber attacks which hit JPMorgan and other financial institutions. The FBI announced that the Bureau is investigating media reports of cyber attacks on US banks and financial firms, but law enforcement hasn’t provided further information on the incidents neither on the affected companies. […]

Pierluigi Paganini August 27, 2014
A Wide Open Backdoor is present in million Netis Routers

Routers manufactured by Netcore and sold worldwide under Netis brand have a wide-open backdoor that can be fairly easily exploited by threat actors. Experts at TrendMicro discovered that routers manufactured by Chinese security vendor and sold under the brand name Netcore in China have a hard-coded password. The hard-coded password allows attackers to access user’s traffic with a backdoor, […]

Pierluigi Paganini August 27, 2014
An automated DDoS reflection attack tool used in the wild

A group of hackers dubbed DERP has created a super tool to coordinate multi protocol DDoS reflection attacks as explained by Melbourne-based Micron21 firm. For the first time ever a hacking group coordinated a range of different DDoS reflection attacks against a data center of the firm Melbourne-based Micron21, the attack occurred on August 2nd. The experts […]

Pierluigi Paganini August 26, 2014
ICREACH program, NSA Search Engine for communications analysis

ICREACH is the codename for the NSA’s Secret Google-Like Search Engine for Metadata Analysis disclosed by a new collection of documents leaked by Snowden. ICREACH is the name of a Google-like search engine designed by the National Security Agency (NSA) that provides metadata related to individuals living in US to more than two dozen US government agencies. The Intercept […]

Pierluigi Paganini August 26, 2014
Compromised data of 27 million people South Korea. 70 percent of the population suffered a data breach.

Authorities confirmed that 27 million individuals in South Korea suffered a data breach, nearly 70 percent of  the population aged between 15 and 65 was hit. A new massive data breach hit more that 27 million people in South Korea, according to the authorities stolen data comes from the gaming industry. It isn’t the first time that […]

Pierluigi Paganini August 25, 2014
FBI warns healthcare industry on possible cyber attacks

FBI is warning businesses operating in the healthcare industry on possible cyber attacks. The FBI is alerting the healthcare industry companies on potential cyber attacks, the law enforcement are warning companies after the attack on U.S. hospital group Community Health Systems Inc that caused the theft of millions of patient records. “The FBI has observed malicious actors targeting healthcare related systems, […]

Pierluigi Paganini August 25, 2014
A dark wing of the intelligence supports the Tor Project

Experts working at US and UK Intelligence agencies on monthly base leak Tor vulnerabilities to the developers at the Tor Project. The BBC reported that the executive director of the Tor Project revealed that both US and UK intelligence agencies share bugs anonymously with Tor developers. The circumstance is quite surprising considering that both NSA and GCHQ […]

Pierluigi Paganini August 24, 2014
Location services, Google is tracking your every move you make

Location services are considered a serious threat to privacy because data managed by company like Google could be used for online surveillance. Many experts consider privacy a utopia, every activity we make online is constantly tracked and in many cases principal service providers manage much more information than needed. Google company has been accused many times […]

Pierluigi Paganini August 24, 2014
A new Side channel attack-how to steal encryption keys by touching PCs

Researchers demonstrated a new side channel attack which allow them to steal encryption keys by simply touching a laptop. Yesterday I published a post on an interesting research conducted by a the team of experts which demonstrated an attack exploits “a newly discovered public side channel” allowing threat actor to access the shared memory statistics of an […]