Security

Pierluigi Paganini September 02, 2013
Reversing Dropbox client code raises security issues

Researchers at last USENIX security symposium presented a new method and consolidated techniques for reversing Dropbox code to bypass Dropbox’s two factor authentication, hijack Dropbox accounts and intercept SSL data. Reversing Dropbox analysis allowed researchers to crack its open cloud storage service, reverse engineering the encryption protecting the client it is possible to open it up […]

Pierluigi Paganini September 01, 2013
Cybercrime abuses Facebook paid advertisements

A reading of an interesting study on the criminal abuse of Facebook’s Paid “Sponsor Ads” system to deliver nefarious websites to the users. In the last weeks I presented on an interesting study of the techniques adopted by the cybercriminals organizations to abuse of the popular social network Facebook. The researchers Frank Angiolelli, Eric Feinberg, Ian Malloy issued a follow up […]

Pierluigi Paganini August 31, 2013
PRISM repercussion on the Tor network accesses

The article proposes the analysis of the impact on the use of the Tor network after the events related to PRISM surveillance program disclosure. The use of Tor Network to preserve user’s anonymity and to avoid government surveillance, we discussed this topic several times explaining that through the analysis of Tor metrics data it was possible to […]

Pierluigi Paganini August 30, 2013
Sabu incited state-sponsored attack for US Government

Former LulzSec leader Sabu (Hector Xavier Monsegur) accused by the hacker Jeremy Hammond to have incited state-sponsored attack for the U.S. Government. LulzSec was a popular group of hacktivists that breached many high profile targets during the last years, we all remember the Sony Pictures occurred in 2011. The group also claimed responsibility for taking down many other […]

Pierluigi Paganini August 29, 2013
Syrian Electronic Army hit NYT and Twitter

The group of Syrian Electronic Army hackers is intensification its hacking campaign pro-Assad. Details of the attacks against the HuffingtonPost UK, Twitter and the NYT. The Syrian Electronic Army once again successful in an attack, to be precise the popular group of hacker this time hacked into Twitter, Huffington Post and NY Times’ registry accounts modifying DNS records and […]

Pierluigi Paganini August 28, 2013
Hacking phone firmware allows paging response attack on GSM

Researchers at last USENIX Security Symposium demonstrated that hacking phone firmware it is possible to violate the security of mobile under the same area Hacking phone firmware it is possible to interfere with other handsets  in the same area, the attack technique has been presented recently at USENIX Security Symposium by telecommunications researcher Kévin Redon. Redon […]

Pierluigi Paganini August 27, 2013
China hit by DDoS attack. The Internet inaccessible for hours

China hit by DDoS attack. The CINIC confirmed that the country suffered a DDoS attack over the weekend causing the Internet inaccessibility for hours. During the weekend China’s Internet was taken down by a powerful DDoS attack, according to security experts behind the offensive there is a group of skilled hackers that on Sunday hit the […]

Pierluigi Paganini August 26, 2013
The FBI claims to have neutralized Anonymous

The FBI claims to have neutralized Anonymous thanks the long series of arrests that hit principal cells of the collective such as LulzSec, Antisec and SABU. FBI in the last months has intensified the investigation on the Anonymous collective, various members of the popular group of hacktivist have been identified and arrested. Lulz Security (Lulzsec) team recognized its responsibility for the Sony Picture […]

Pierluigi Paganini August 25, 2013
Poison Ivy still alive, old malware new cyber threats – FireEye report

Security vendor FireEye has published a detailed analysis on the popular Poison Ivy RAT, releasing also a set of tools to analyze infections. Security firm FireEye published an interesting analysis on the popular malware Poison Ivy, a remote access trojan (RAT) used in RSA SecurID attack. Poison IVY was also used in the 2011 Nitro […]

Pierluigi Paganini August 24, 2013
Critical Pinterest Exploit threatens the privacy of millions of users

Security researcher Dan Melamed has found a serious Pinterest Exploit that exposed user’s information of over 70 Million accounts. The security researcher Dan Melamed has found a Critical Pinterest Exploit that compromised the privacy of over 70 Million Users, the flaw allows hackers to view the email address of any user on Pinterest. Pinterest is a very popular […]