Hacking

Pierluigi Paganini June 01, 2016
Infographic – Deep web illegal activity exceeds approximately $100,000,000

The infographic created by experts at Norwich University highlights deep web crime and identity theft by providing astonishing statistics. A recent survey conducted by the U.S. government found that over half of all American internet users have cut back on their online activity due to cyber security concerns. In particular, many of these concerns related […]

Pierluigi Paganini May 31, 2016
Self-propagating ransomware spreading in the wild

Be careful, Microsoft is alerting all Windows users of a new type of a Self-propagating ransomware that exhibits worm-like behavior to propagate itself. Microsoft is alerting all Windows users of a new type of ransomware that exhibits worm-like behavior. “We are alerting Windows users of a new type of ransomware that exhibits worm-like behavior. This […]

Pierluigi Paganini May 31, 2016
CVE-2016-2107 OpenSSL Flaw still affects many Alexa Top Sites

According to the security firm High-Tech Bridge many of the Alexa Top 10,000 websites are still vulnerable to the OpenSSL flaw CVE-2016-2107. The CVE-2016-2107 flaw affecting the open-source cryptographic library could be exploited to launch a man-in-the-middle attack leveraging on the ‘Padding Oracle Attack’ that can decrypt HTTPS traffic if the connection uses AES-CBC cipher and the server supports AES-NI. According […]

Pierluigi Paganini May 30, 2016
Android 6.0 Marshmallow permission-granting model is under attack

Malware researchers are warning Android’s latest permission-granting model in version 6.0 Marshmallow is now been targeted by Mobile malware authors. Android’s latest permission-granting model in version 6.0 Marshmallow is now been targeted by Mobile malware authors. The model  will let users grant permissions only when it is required by the app, rather be accepting all […]

Pierluigi Paganini May 30, 2016
US-CERT warns MEDHOST medical app contains hard-coded credentials

The US Computer Emergency Response Team has issued a warning after the discovery a security issue the popular medical application MEDHOST PIMS (PIMS). Many security experts believe that medical industry lack of a proper security posture, despite it is a high-tech sector the vast majority of medical equipment was not designed with a security by design […]

Pierluigi Paganini May 30, 2016
Hacker Interviews – Speaking with Mikko Hypponen

Mikko Hypponen does not need any introduction, he is a true star, one of those professionals who have indelibly marked the evolution of the cyber security industry. I consider Mikko a legend, and I’m happy to share with you this interview. Enjoy it!   Hi Mikko, you are a legend of the hacking community, can […]

Pierluigi Paganini May 29, 2016
Hacking NTP Servers from Long-Distance with low cost devices

A couple of experts demonstrated how to wirelessly change the time on NTP servers over long distances using an inexpensive equipment. The HACK IN THE BOX conference is a hotbed of interesting hacks,  today I will present you the results of a research conducted by the researchers Yuwei Zheng and Haoqi Shan from Qihoo360 firm that explained […]

Pierluigi Paganini May 28, 2016
Hundred Million Stolen MySpace Passwords for sale in the darkweb

The hacker Peace is offering for sale hundred Million stolen MySpace Passwords on the black marketplace. This is one of the greatest leaks of ever. A few days ago a hacker with the nickname “Peace” offered for sale on the black market 117 million LinkedIn account credentials. The same hacker is offering for sale 360 million emails and […]

Pierluigi Paganini May 27, 2016
A fourth bank hit by SWIFT hackers, are they backed by the DPRK

A fourth Bank in Philippines was a victim of the SWIFT hackers and experts at Symantec confirmed the malware shares code with tools used by the Lazarus group. The list of banks victims of the SWIFT hackers is lengthening, a fourth bank in the Philippines has been a victim of the crew that targeted the SWIFT interbank transfer system. […]

Pierluigi Paganini May 27, 2016
Installing rogue apps on iOS devices via SandJacking Attack

The security expert Chilik Tamir from Mi3 Security has devised a new attack dubbed SandJacking to install rogue apps on iOS devices. The security expert Chilik Tamir from Mi3 Security has devised some new attack methods that can be exploited by threat actors to install malicious apps on non-jailbroken iOS devices. Tamir presented his attack methods at […]