Security

Pierluigi Paganini October 24, 2013
uProxy, Digital Attack Map and Project Shield,Google to secure the web

Google has just revealed the details on tree new technologies, uProxy, Digital Attack Map and Project Shield, to secure the web and to fight censorship. This week Google launched the Project Shield, an initiative sustained by the company to protect enterprises from DDoS attack that are becoming a serious problem for Internet infrastructures. Google is […]

Pierluigi Paganini October 23, 2013
Hackers in the service of cybercrime, a concerning trend

Hackers are becoming a precious category of professionals also for organized crime, their effort is creating even more problems for law enforcement. A hacker illegally gained access to 60,000 servers worldwide and used them for large scam, the systems have been abused for online shopping with a stolen foreign credit card number. This time it […]

Pierluigi Paganini October 22, 2013
Verizon Wireless – how a simple bug could cause a disaster

A researcher discovered a serious vulnerability in Verizon Wireless’s Web-based customer portal that enabled anyone to download user’s SMS message history. A security researcher found a simple flaw that exposed Verizon Wireless users’ SMS history, the critical flaw allows an attacker to access the list of SMS history viewing all the numbers of users that communicated […]

Pierluigi Paganini October 22, 2013
Facebook FBStalker tool uses Graph Search for powerful OSINT analysis

Experts Werrett and Lee demonstrated how to conduct a powerful analysis using FBStalker, a tool created to find a comprehensive amount of data on any Facebook user. Facebook, and more in general social networks, is a platform that if not properly managed could harm user’s privacy, the fact that also friends’ social behavior could have […]

Pierluigi Paganini October 19, 2013
Apple iMessage vulnerable to MITM attack

Quarkslab researchers Cyril Cattiaux has revealed Apple lied when it claimed it could not intercept iMessages sent by its users. Quarkslab researchers Cyril Cattiaux revealed that it is possible to break encryption implemented in Apple’s iMessage application due the presence of a weakness in the key management process. The announcement was made during  the Hack in the Box conference […]

Pierluigi Paganini October 18, 2013
Arbor Networks has published ATLAS Q3 2013 DDoS report

Arbor Networks has published a quarterly report based on data pulled from ATLAS which includes new insight into DDoS attack trends having worrying characteristics. Arbor Networks has issued the report on global DDoS attack trends for the first three quarters of 2013, the report revealed that this kind of attack still represents a serious menace for IT […]

Pierluigi Paganini October 17, 2013
A vBulletin exploit used to hack thousands of websites

Security firm Imperva revealed that more than 35000 websites based on vBulletin CMS have been hacked exploiting a known vulnerability. Security experts warn of a massive attack against web sites that exploits  security flaw sites powered by the forum software vBulletin. On August vBullettin authors warned on “Potential vBulletin Exploit (vBulletin 4.1+, vBulletin 5+)”. The exploits […]

Pierluigi Paganini October 16, 2013
Google Chrome users are vulnerable to sensitive data theft

Security experts at Identity Finder demonstrated that Google Chrome users are vulnerable to sensitive Data Theft because the browser stores it unencrypted. Google Chrome is today the most diffused web browser, nearly 39% of internet users have chosen it according the data proposed by StatCounter. The reason of the success behind Google Chrome is its efficiency […]

Pierluigi Paganini October 15, 2013
Profession Hacker, it’s shortage for cyber experts

Hacker, a figure considered today one of the most precious professional by Government organizations, private businesses and intelligence agencies. It’s a shortage! All the report produced by principal security firms remark a meaningful increase in the number of cyber attacks against organizations, government offices and private companies. The increased number of cyber incidents is animating […]

Pierluigi Paganini October 13, 2013
A backdoor present in many D-Link devices allows to bypass authentication

Researcher Craig published an interesting blog post on “/dev/ttyS0” on the reverse engineering of the backdoor present in many D-Link devices. Today I decided to propose an interesting backdoor analysis published on the blog “/dev/ttyS0” specialized on the embedded device hacking. The researcher Craig demonstrated the presence of a backdoor within some DLink routers that allows an attacker to […]