Hacking

Pierluigi Paganini March 15, 2016
Crooks exploit Oman websites in typosquatting attacks

According to experts at Endgame security firm, crooks are buying many .om domains to carry on typosquatting attacks. Crooks are buying many .om domains to carry on typosquatting attacks. According to experts at Endgame security firm, crooks are buying many .om domains with the purpose to fool clumsy users that mistype .om instead of .com […]

Pierluigi Paganini March 15, 2016
The GM Bot v2 released after source leak, it is more expensive of v2

After the source code of the Android banking Trojan GM Bot was leaked online, the new version GM Bot v2 was offered for sale. The availability of the source code of a malware in the criminal underground represents a great opportunity for crooks that can customize the threat allowing its evolution in an unpredictable way. […]

Pierluigi Paganini March 14, 2016
Placing a skimmer on Gas Station Card Scanner in less than 3 seconds

Attack ATM is very simple for criminals, a video released by Miami Beach Police shows two men installing a credit card skimmer in less than 3 seconds. In October, the CENTRAL MEANS OF PAYMENT ANTIFRAUD OFFICE (UCAMP) of the Italian Ministry of Economy and Finance released the annual report on Payment card frauds. This year […]

Pierluigi Paganini March 14, 2016
The leader of the Team GhostShell collective revealed his identity

G.Razvan Eugen is a 24 year-old Romanian that claims to be the founder of the collective Team GhostShell that hacked numerous entities worldwide. Do you remember the notorious Team GhostShell hacking crew? GhostShell is a group of hacktivists most active in 2012 that targeted systems worldwide, the list of victims is long and includes the FBI, NASA, […]

Pierluigi Paganini March 13, 2016
Reuters – Malware suspected in the Bangladesh central bank heist

Investigators suspect the attackers behind the Bangladesh central bank ‘s hack have used a malware to gather information for the Fed’s heist. One of most intriguing stories this week is the hack of the Bangladesh account at the Federal Reserve Bank of New York. The Bangladesh’s Finance Minister Abul Maal Abdul Muhith accused the U.S. Federal Reserve of […]

Pierluigi Paganini March 13, 2016
CISCO warns customers of high-severity flaws in modems and gateways

Cisco released a series of software updates to patch several high severity flaws in its cable modems, residential gateways and security appliances. Cisco just patched critical vulnerabilities in its cable modems, residential gateways and security appliances. The security updates released this week fix serious flaws in Cisco residential reported by Kyle Lovett, and Chris Watts from Tech […]

Pierluigi Paganini March 12, 2016
DARPA Improv program, weaponizing the off-the-shelf electronics

The Defense Advanced Research Projects Agency is launching a new project dubbed Improv that aims to develop new techniques to hack into everyday technology. The IoT paradigm is enlarging as never before our surface of attack, it is obvious that cyber criminals and nation-state hackers are looking at it with an increasing interest. The US Military Defense […]

Pierluigi Paganini March 12, 2016
Typos stopped hackers stealing $1bn from Federal Reserve Bangladesh account

Hackers who allegedly infiltrated the Federal Reserve Bangladesh’s account were attempting to steal almost $1 billion, but typos thwarted the plan. This week the principal news agencies shared the news of the hack of the Bangladesh account at the Federal Reserve Bank of New York. The Bangladesh’s Finance Minister Abul Maal Abdul Muhith accused the U.S. Federal […]

Pierluigi Paganini March 11, 2016
0-day critical flaws in mobile modems allow hackers to take over your PC

The Russian security tester Timur Yunusov has discovered critical flaw affecting routers and 3G and 4G mobile modems from Huawei, ZTE, Gemtek, and Quanta. The Russian security tester Timur Yunusov has discovered critical vulnerabilities affecting routers and 3G and 4G mobile modems from Huawei, ZTE, Gemtek, and Quanta. The security holes could be exploited by remote attackers […]

Pierluigi Paganini March 11, 2016
How to hack mobile phones embedded fingerprint sensor using 2D Printed fingerprints

Two Computer Science researchers developed a technique to hack a phone’s fingerprint sensor in 15 mins with $500 worth of inkjet printer and conductive ink The Computer Science researchers Kai Cao and Anil K Jain have developed a new technique for hacking a mobile device’s fingerprint sensor in 15 mins with $500 worth of an […]