Hacking

Pierluigi Paganini March 02, 2016
US DoD invites a restricted number of hackers to Hack the Pentagon

Hack the Pentagon – DoD would invite outside hackers to test the cybersecurity of some public US Defense Department resources as part of a pilot initiative. Which is the best way to discover security vulnerabilities affecting a computer system? Ask a group of hackers to test it. This is the concept behind a bounty program, […]

Pierluigi Paganini March 02, 2016
33 percent of all HTTPS websites open to DROWN attack

Security experts presented the DROWN attack that exploits a new critical security vulnerability affecting the OpenSSL. Security experts have discovered a new critical security vulnerability affecting the OpenSSL, it has been estimated that more than 11 Million websites and e-mail services are open to cyber attacks. The new attack, dubbed DROWN (stands for Decrypting RSA with […]

Pierluigi Paganini February 29, 2016
Using the Microsoft EMET security tool to hack itself

The security researchers at FireEye Abdulellah Alsaheel and Raghav Pande have found a way to exploit Microsoft EMET (Enhanced Mitigation Experience Toolkit) to hack itself. The security researchers at FireEye security Abdulellah Alsaheel and Raghav Pande have found a way to exploit the Microsoft security tool Enhanced Mitigation Experience Toolkit to hack itself. The Enhanced Mitigation […]

Pierluigi Paganini February 29, 2016
Chinese ISPs are redirecting users legitimate traffic to malicious sites/ads

Chinese ISPs (internet service providers) are redirecting users legitimate traffic to malicious websites serving malware and ads. China is know to be not very “ortodox” when talking about freedom on the internet, over the time, it developed numerous projects to monitor users’ activity. The Great Firewall Now three Israeli researchers uncovered that Chinese ISPs (China Telecom […]

Pierluigi Paganini February 29, 2016
A journalist has been hacked on a plane while writing an Apple-FBI story

The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises the discussion on privacy. Experts in the aviation industry are spending a significant effort in the attempt of improving cyber security. The news that I’m going to tell you has something of incredible. The American journalist […]

Pierluigi Paganini February 28, 2016
German authorities approve the use of home-made Federal Trojan

The German Interior Ministry has approved the use of a federal Trojan developed by the German Federal Criminal Police. The German Interior Ministry has approved the use a spyware developed by the German Federal Criminal Police, aka the ‘federal Trojan’ or Bundestrojaner, for the investigative purpose. “Soon the state could re-enter the computer of suspicious […]

Pierluigi Paganini February 27, 2016
Securing Hospitals from hackers that can put lives in dangers

Securing Hospitals is a report issued by Independent Security Evaluators that demonstrates how hackers can hack hospitals putting lives in danger. A group of experts from the Independent Security Evaluators research team have tested the security of hospital networks, demonstrating how it is possible to gain access to critical medical equipment in attacks they say could put lives in danger. […]

Pierluigi Paganini February 26, 2016
Wikileaks – NSA tapped world leaders for US geopolitical Interests

The NSA tapped world leaders for US Geopolitical Interests, including a conversation between Netanyahu-Berlusconi over the U.S.-Israel Relations. A couple of days ago the non-profit journalistic organisation WikiLeaks published a collection of highly classified documents that reveals the NSA targeted world leaders for US Geopolitical Interests. Some of the intercepts are classified TOP-SECRET COMINT-GAMMA, these are most […]

Pierluigi Paganini February 26, 2016
Discover how many ways there were to hack your Apple TV

Apple has patched more than 60 vulnerabilities affecting the Apple TV, including flaws that can lead to arbitrary code execution and information disclosure. IoT devices are enlarging our attack surface, we are surrounded by devices that manage a huge quantity of information and that could be abused by hackers. Apple has patched more than 60 […]

Pierluigi Paganini February 26, 2016
The DoD funded the Carnegie Mellon University’s research on Tor Hacking

A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor hacking. In November 2015, the researchers at the Tor Project publicly accused the FBI of paying the experts at the Carnegie Mellon University to deanonymize Tor users. The experts at the Tor Project collected information about the […]