Hacking

Pierluigi Paganini August 16, 2016
The unmanned jihad in the sky

UAV – “Go ahead, look up [points to the sky] … see the drone? No? It’s alright, because the drone sees you. Sees your face. We know who you are.” The scene is from the movie “13 hours – The secret story of the soldiers of Benghazi”: as the member of Ansar al-Sharia looks up, […]

Pierluigi Paganini August 16, 2016
Oracle MICROS hackers breached five more PoS system vendors

Hackers that breached Oracle MICROS systems have infected systems of other five PoS vendors that supply hundreds of thousands of companies in the US. Last week the systems of the Oracle MICROS payment terminals division have been infected by a malware, MICROS payment terminals are installed in the most important retail chains worldwide as well […]

Pierluigi Paganini August 15, 2016
DDoSCoin, the cryptocurrency that pays the participation in DDoS attacks

Two researchers have devised a cryptocurrency scheme dubbed DDoSCoin that pays everytime a user participates in a DDoS attack against certain servers. The assistant professor at the University of Colorado Eric Wustrow and the phD student at the University of Michigan Benjamin VanderSloot have conducted a curious proof-of-concept project aimed at the creation of a cryptocurrency that […]

Pierluigi Paganini August 14, 2016
Bitfinex offers a $3.5M reward for info that help to recover stolen Bitcoins

Bitfinex exchange is willing to offer 5% of the lost funds (nearly 6,000 BTC) as a reward for the recovery of the stolen bitcoins. Early August, the Bitcoin plunged just over 20% after news of the security breach suffered by Bitfinex that led the theft of 120,000 Bitcoin. Last week the company announced a reward of […]

Pierluigi Paganini August 14, 2016
DEF CON 2016 – Bluetooth-based smart locks easy to hack

Security Researchers demonstrated at the Def Con hacker conference how it is easy to open some Bluetooth-based smart locks. Last week security researchers Ben Ramsey and Anthony Rose of Merculite Security demonstrated at the Def Con conference how it is easy to open some Bluetooth-based smart locks. The duo analyzed 16 smart locks from companies […]

Pierluigi Paganini August 12, 2016
DiskFiltration Stealing data from air-gapped networks via acoustic signals

A group of experts devised a technique dubbed DiskFiltration to exfiltrate data from air-gapped networks relying on acoustic signals emitted from HDDs We are aware that air-gapped networks aren’t totally secure, security experts have devised several methods to exfiltrate information across the years. The last technique presented by a group of researchers was dubbed ‘DiskFiltration’ […]

Pierluigi Paganini August 12, 2016
Are voting machines easy to hack? Yes, because they are outdated

Is it possible to hack voting machines? According to cyber security experts, it is possible due to the use of outdated systems. The recent attacks against the DNC and Hillary Clinton‘s server raised the question about the cyber security of entire US election machine. Speaking at the Aspen Security Forum, Lisa O. Monaco, homeland security […]

Pierluigi Paganini August 12, 2016
Information warfare – The Rise of the Cyber Offense

Information warfare – The development of cyber capabilities is strategic for any governments, computer systems and Internet of Things even more at risk. By the mid-1990’s the US intelligence agencies, especially the NSA, were beginning to wake up to a grim reality – the world was quickly becoming connected and the tools to connect that […]

Pierluigi Paganini August 11, 2016
Hacker Interviews – RootPhantom from Phantom Squad

Today I have interviewed RootPhantom, another member of the popular hacker crew Phantom Squad. Enjoy the interview!   You are a talented hacker that has already participated in several hacking campaigns, could you tell me more about. We did shut down the PSN and Xbox services last year. Could you tell me which his your […]

Pierluigi Paganini August 11, 2016
Serious Linux design flaw CVE-2016-569 allows Traffic Hijacking

A severe design flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into connections, and run a wide range of attacks. A severe flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into downloads and web pages, and run a wide range of […]