Security

Pierluigi Paganini June 20, 2013
Webcam hacking exploits Chrome Inbuilt Flash player for Camjacking

Researcher Egor Homakov demonstrated the possibility of Webcam hacking exploiting Chrome Inbuilt Flash player, a flaw that represents a serious threat to privacy. Webcam hacking, hackers are increasing their interest on millions of cams that surround us. These prying eyes are everywhere, in the street as in our home, gaming consoles, smartTV and PC are all equipped […]

Pierluigi Paganini June 18, 2013
Zeus Trojan steals funds and recruits Money Mules

Security firm Trusteer detected a new variant of Zeus Trojan that steals funds and recruits Money Mules proposing jobs ads to the victims using Man-in-the-Browser (MitB) techniques. Zeus Trojan is becoming even more complex, its evolution is unpredictable due to the intense activity in the underground on its source code. Various forums in the underground offer customization […]

Pierluigi Paganini June 17, 2013
Palantir, private industries … Who helped NSA to build Prism?

Palantir Technologies is considered the principal company behind the design of software used for PRISM program, think of it as the work of a single company is truly an understatement. Palantir Technologies, this is the most popular company name referred when discussing those who have supported the U.S. Government in the development of massive surveillance […]

Pierluigi Paganini June 15, 2013
Iranian Gmail accounts targeted by state-sponsored attack

Google revealed that tens of thousands of Gmail accounts belonging to Iranian users have been targeted by state-sponsored attacks. The Google company announced that tens of thousands of Gmail accounts of Iranian users have been targeted hacked. The attacks seem to be organized by a group of state sponsored hackers few days before presidential elections. The […]

Pierluigi Paganini June 14, 2013
US Cloud hosting providers targeted by cybercriminals

US Cloud hosting providers are chosen with increasing frequency as privileged targets of cybercrime, these platforms are ideal for the launch of cyber attacks financially motivated. Cloud hosting providers are becoming privileged targets of cybercrime, two malware researchers revealed in fact the number of cyber attacks financially motivated against those platforms is increasing. Mary Landesman, […]

Pierluigi Paganini June 13, 2013
The business behind a hacked email account

Which is the commercial value of a hacked email account in the underground? How cybercriminals use a compromised email account? Why do they have to hit me? Which is the commercial value of a hacked email account in the underground? Brian Krebs has recently published a valuable post on commercial value for a hacked email account, […]

Pierluigi Paganini June 10, 2013
DDoS Mitigation – Choosing a Cloud-based solution

An introduction of DDoS mitigation techniques focused on Cloud-based DDoS Mitigation solution, an approach implemented by many companies. Despite their prevalence, DDoS (Distributed Denial of Service) attacks have been erroneously considered minor attacks by some parts of the security community due their “limited” duration. Victims of DDoS attacks are typically forced to interrupt their services […]

Pierluigi Paganini June 07, 2013
PRISM – US Top Secret massive surveillance program revealed

The top-secret PRISM project claims direct access to servers of major IT corporates including Google, Apple and Facebook. The recent news on the control of communications made ​​by the US Government through the PRISM program has literally left bewildered public opinion, everyone imagined it but when the Population has been confronted with the evidence remained shocked. […]

Pierluigi Paganini June 06, 2013
NSA collecting phone records of millions of US citizens daily

The U.S. NSA is collecting phone records of millions of Verizon Communications customers, according to a secret court order obtained by the Guardian. The U.S. NSA is collecting phone records of millions of customers Verizon, the second telephone company in the country. The shocking news has been revealed by ‘Guardian‘ whose journalists had access to a “Top […]

Pierluigi Paganini June 04, 2013
Mactans charger, a malicious hardware that could infect any Apple iOS devices

Mactans charger, this is the name of the malicious charger that will be presented by researchers at the Black Hat 2013 conference in July that is able to inoculate a malware in any Apple iOS devices. Researchers from the Georgia Institute of Technology  announced the creation of Mactans charger, a custom wall charger for Apple iPhone and iPad […]