Hacking

Pierluigi Paganini November 06, 2016
How to Exploit Belkin WEMO gear to hack Android devices

Belkin’s WeMo home automation firmware that’s in use in several IoT devices has recently been found vulnerable to an SQL injection. Belkin’s WeMo home automation firmware that’s in use in its light bulbs, switches, security cameras, coffee makers and room heaters has recently been found vulnerable to an SQL injection. The hack allows root privileges […]

Pierluigi Paganini November 06, 2016
Watch out! A new LinkedIn Phishing campaign is spreading in the wild

Experts from Heimdal Security reported a recent LinkedIn phishing campaign aiming to collect confidential information from unsuspecting users. Phishing attacks continue to be a serious threat, crooks exploit paradigms such as social medial platforms and mobile in the attempt of stealing sensitive data.According to 2015 Verizon Data Breach Investigation Report, 23% of email recipients open […]

Pierluigi Paganini November 06, 2016
Commercial Exaspy spyware used to target high-level executives

Security researchers at Skycure have discovered a new commodity Android Spyware, dubbed Exaspy, targeting high-level executives. While in many countries the number of Smartphone and Tables is greater of desktop PC, new threats are targeting mobile devices. Researchers at Skycure have discovered a new strain of Android spyware, dubbed Exaspy, that has been used in targeted attacks against […]

Pierluigi Paganini November 05, 2016
The US Government is ready to hack back if Russia tries to hit Presidential Election

Documents and testimonials collected by the NBC news confirm US Government cyber army is ready to hack back if Russia tries to disrupt Presidential Election The alleged interference of Russian state-sponsored hackers into the 2016 Presidential election is triggering the response of the US. For the first time, a member of the US Presidential Staff has treated another country […]

Pierluigi Paganini November 05, 2016
How to compromise PLC systems via stealthy Pin control attacks

At the Black Hat Europe 2016 two security researchers devised undetectable attacks that could be used to hack PLC systems avoid being detected. Security researchers at the Black Hat Europe 2016 have presented a new attack method that could be used to hack programmable logic controllers avoid being detected. programmable logic controllers are essential components for […]

Pierluigi Paganini November 04, 2016
Malware used to spy Iran’s nuclear negotiations in the Geneve’s venue

Switzerland’s attorney general has confirmed to have investigated the presence of spyware in a venue that also hosted talks on Iran’s nuclear negotiations. Swiss officials confirmed to have found an espionage malware in the computer equipment at Geneva venue, a five-star hotel (believed to be Hotel PrĂ©sident Wilson)  that has hosted sensitive talks including Iranian nuclear negotiations. […]

Pierluigi Paganini November 04, 2016
Shadows Kill Mirai Botnet caused an Internet outage in Liberia, what is the next one?

Mirai botnet was used to power a massive DDoS attack against Liberia causing the Internet outage in the entire country with financially devastating results. Mirai is the malware that a few weeks ago caused a massive Internet outage in the US. Mirai was first spotted this summer by the security expert MalwareMustDie, now media reported the use of the […]

Pierluigi Paganini November 04, 2016
ISIS Is Watching you: Islamic State Hacking Team Shares Access to Security Cameras Around the Word

BLACKOPS Cyber (BOC) reported to the authorities that a well-known ISIS hacking team was sharing access links to widely used surveillance systems. BLACKOPS Cyber (BOC), a U.S. based Cyber Intelligence firm, located a new type of threat in October which is indicative of the latest focus of the terrorist organization – technical resource development for […]

Pierluigi Paganini November 03, 2016
Critical DOM XSS flaw on Wix.com put million websites at risk

A DOM-based cross-site scripting vulnerability in the cloud-based development platform Wix.com put million websites at risk. The cloud-based development platform Wix.com is affected by a DOM-based cross-site scripting vulnerability that could be exploited by attackers to gain full control over any website running on the popular platform. Millions of websites hosted on Wix.com are potentially […]

Pierluigi Paganini November 03, 2016
Critical MySQL flaws can allow attackers to hack into your server

The security expert Dawid Golunski disclosed critical vulnerabilities in MySQL, MariaDB and PerconaDB can lead fully compromise of servers. Critical vulnerabilities affecting the MySQL, MariaDB and PerconaDB can lead fully compromise of servers. The flaws could be exploited by attackers to arbitrary code execution, root privilege escalation and, of course, server compromise. Dawid Golunski (@dawid_golunski) from Legal […]