search

Date range
Filters

1178 results

Pierluigi Paganini July 26, 2015
HORNET, the High-Speed Tor-Like encrypted anonymous network

A group of six academics has developed Hornet, a new high-speed anonymity network that promises to be a valid alternative to the popular Tor network. Hornet allows for anonymous web surfing protecting the user’s privacy. The principal advantage HORNET has respect other anonymizing networks like Tor, is the speed. The Hornet is able to manage anonymous traffic […]

Pierluigi Paganini July 24, 2015
Exploit acquisition program terminated by Netragard

Netragard has shut down its exploit acquisition program, as a result of the clamorous data breach that the Italian firm HackingTeam has suffered. In this article we will go through an issue with a company that buys and sells exploits (Netragard) and the steps it was forced to take since one of their clients was […]

Pierluigi Paganini July 22, 2015
Deep dive into attribution trove of Hacking Team

Thi post was written by the security experts and colleagues at RedSocks, they explored the argument of the “Attribution” for the Hacking Team data Breach. Attribution is probably one of the toughest things to deal with during a major Cyber Security breach, yet it is one of the most demanded skills.Earlier in the first incident […]

Pierluigi Paganini July 17, 2015
New GamaPoS Malware served by the Andromeda Botnet

The experts at Trend Micro discovered GamaPoS, a new PoS malware that is spread through the Andromeda botnet in the US and Canada. GamaPoS is the name of the last PoS malware used by criminal crews to steal credit card data from the memory of payment systems. Security experts at Trend Micro discovered which discovered the […]

Pierluigi Paganini July 07, 2015
Traffic in Tor network is being sniffed in the exit nodes

A security researcher conducted an experiment to demonstrate that someone is sniffing passing traffic from Tor network exit nodes. When talking about Tor network, normally everyone assumes that you have an end-to-end security, but someone believes it may be wrong as it was discovered by the security researcher Chloe. Tor network is free and it […]

Pierluigi Paganini July 02, 2015
Flaw in 802.11n opens wireless networks to remote attacks

Researchers discovered a vulnerability in the 802.11n wireless networking standard that could be exploited by a remote attacker to target wireless networks. According to researchers from the Expertise Centre for Digital Media at the Hasselt University in Belgium, the frame aggregation mechanism implemented by the 802.11n wireless networking standard is affected by a security a […]

Pierluigi Paganini June 07, 2015
The silent war between black markets in the deep web

The silent war between black markets in the deep web, Mr Nice Guy hired a blackmailer to hit TheRealDeal and its competitors. TheRealDeal hacked back. Today I desire to tell you a story of ordinary war among operators behind principal black markets. A few weeks ago I have published a detailed analysis of a new black market […]

Pierluigi Paganini April 12, 2015
How far do stolen data get in the deep web after a breach?

A group of experts at Bitglass used watermarks to track data through the Deep Web and discover how far does it get after a data breach. Early detection of a data breach is crucial to limit the data exposure, unfortunately sometimes they are necessary many months before a breach is detected by security experts. To […]

Pierluigi Paganini March 31, 2015
Why do people commit monetary crimes using the web and why is it so fruitful?

Find out more about online crime and understand why it can be so fruitful, unlike other forms of crime, in order to thoroughly protect your financial transactions and banking details. Unfortunately, nowadays due to the fact that we are used to going on vacation and hold a lot of money in our pockets, it is […]

Pierluigi Paganini March 30, 2015
Darknet Sheep Marketplace website owner arrested

Thomas Jiřikovský suspected of owning the black marketplace Sheep Marketplace, an alternative for Silk Road, was arrested while trying to buy a luxury house. The Operation Onymous and the seizure of the popular Silkroad black market have deeply influenced the underground ecosystem. The closure of Silkroad advantaged other black markets like Evolution and Sheep Marketplace. The Evolution […]