Hacking

Pierluigi Paganini February 07, 2017
76 Popular iOS apps are vulnerable to man-in-the-middle (MITM) attacks

A study conducted on iOS mobile apps revealed that many of them are affected by security vulnerabilities that expose users to man-in-the-middle (MitM) attacks. A new study confirms that dozens of iOS apps are affected by vulnerabilities that could be exploited by hackers to run man-in-the-middle (MitM) and intercept data from connections even if protected by TLS. […]

Pierluigi Paganini February 07, 2017
Crooks hacked Polish banks with a malware planted on Government site

Several Polish banks confirmed their systems were infected with a malware after their staff visited the site of the Polish Financial Supervision Authority. Polish banks are investigating a massive cyber attack after a malware was spotted on several servers of the financial institutions. The cyber attack was first reported by the Zaufana Trzecia Strona, a local […]

Pierluigi Paganini February 06, 2017
A Hacker hijacked over 150,000 Printers publicly exposed online

A hacker hijacked over 150,000 Printers publicly exposed online to warn owners of cyber attacks. Recently a group of researchers from the University Alliance Ruhr has found a cross-site printing bug in the old PostScript language. Popular printer models manufactured by Dell, Brother, Konica, Samsung, HP, and Lexmark are affected by security vulnerabilities that could be exploited by […]

Pierluigi Paganini February 06, 2017
Microsoft Windows DRM issue could be exploited to uncloak Tor Browser users

HackerHouse researchers have discovered that media content protected by Digital Rights Management (DRM) can be used to uncloak Windows Tor Browser users. The anonymity of the Tor users is threatened by a new issue related the Microsoft’s DRM. Windows users running the Tor browser can be de-anonymized with a trick based on the Microsoft DRM (Digital Rights […]

Pierluigi Paganini February 06, 2017
The Slammer worm is back after 13 years to target ancient SQL servers

The SQL Slammer worm, one of the most long-lived malware, now seems to be back online to compromise ancient SQL servers worldwide. SQL Slammer is probably one of the most long-lived threats, it first appeared  14 years ago and now it is back to compromise ancient SQL servers. SQL Slammer exploits an ancient flaw in Microsoft SQL […]

Pierluigi Paganini February 06, 2017
SCADA Honeywell XL Web II Controller exposed password in clear text

The web-based SCADA system Honeywell XL Web II Controller is affected by multiple flaws that can be remotely exploited to expose passwords in clear text. A popular web-based SCADA system designed by Honeywell is affected by multiple vulnerabilities that can be remotely exploited to expose passwords in clear text. In order to access the password in clear […]

Pierluigi Paganini February 05, 2017
NATO presents the Tallinn Manual 2.0 on International Law Applicable to cyberspace

NATO’s Cooperative Cyber Defense Centre of Excellence (CCDCOE) has published ‘Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations.’ Its world launch will be in Washington DC, February 8 at The Atlantic Council; followed by Europe at The Hague, February 13; and Tallinn, February 17. The manual will be available from February 8 […]

Pierluigi Paganini February 05, 2017
Anonymous hacked Freedom Hosting II, a fifth of the Dark Web is down

The group of hacktivists Anonymous hacked the popular Freedom Hosting II Dark Web hosting provider, a fifth of the .onion websites is down. The collective Anonymous is back, this time the hacker groups breached Freedom Hosting II, a popular Dark Web hosting provider. After the closure of the original Freedom Hosting, Freedom Hosting II (FHII) become […]

Pierluigi Paganini February 05, 2017
12 InterContinental Hotels Group properties suffered a massive data breach

Hackers compromised payment systems at 12 US properties of the InterContinental Hotels Group and stolen card data with a malware. The hospitality giant InterContinental Hotels Group (IHG) has confirmed that payment systems of 12 US hotels were victims of a massive data breach. Just a month ago the company InterContinental Hotels Group (IHG) confirmed an […]

Pierluigi Paganini February 04, 2017
Hacker leaked tools stolen from mobile forensics company Cellebrite

The hacker that breached the systems of the mobile forensics company Cellebrite leaked online some tools and announced further releases. In January the Israeli mobile phone data extraction company Cellebrite was hacked, the company went in the headlines in the dispute between Apple and the FBI in the case of the San Bernardino shooter’s iPhone. The main […]