Hacking

Pierluigi Paganini July 27, 2016
KeySniffer – How to remotely hack wireless Keyboards

Experts discovered that Wireless keyboards from several vendors don’t use encryption when communicating with USB dongle being opened to KeySniffer attacks Security experts from Bastille firm have devised a method of attack dubbed KeySniffer to remotely intercept keystrokes or send commands to a targeted computer. The researchers have analyzed non-Bluetooth wireless keyboards from 12 manufacturers discovering that […]

Pierluigi Paganini July 26, 2016
Hacker Interviews – Revolxy from PøwerfulGreəkArmy

Another interview with one of the black hat hackers on the internet, he is Revolxy from PøwerfulGreəkArmy hacker crew. Enjoy the Interview. You are a known hacker that has already participated in several hacking campaigns, could you tell me more about. I have participated in campaigns such as #OpTurkey , #OpISIS and #OpPedo. I’m targeting government […]

Pierluigi Paganini July 26, 2016
Hacker Interviews – MLT, Core member of the TeaMp0isoN

Today I have interviewed one of the core members of the popular TeaMp0isoN crew, as usual, these chats are very precious for experts that want know more about hacking activities. Enjoy the Interview. Could you tell me which his your technical background and when you started hacking? Which are your motivations? My technical background in […]

Pierluigi Paganini July 26, 2016
Europol and IT security firms united against the ransomware

The No More Initiative aims to spread information about ransomware and the risk of exposure,providing suggestions to avoid falling victim to the threat. A joint operation conducted by the Europol with police and cyber security firms worldwide aims to tackle the Ransomware threat. It has been estimated that the ransomware victims tripled in the first quarter of […]

Pierluigi Paganini July 26, 2016
Hackers are offering for sale O2 customer data on the dark web

O2 customer data that was reportedly first stolen from the gaming site XSplit in November 2013 are now offered for sale on the Dark Web. In the dark web it is possible to find any kind of illegal product and services, from weapons to payment card data, last disconcerting discovery is related to the availability of O2 customer data in the […]

Pierluigi Paganini July 26, 2016
Hacker Interviews – Korrupt

Another interview with one of the black souls of the Internet, Korrupt, which is involved in various hacking campaigns. Enjoy the Interview.   You are a popular talented hacker that has already participated in several hacking campaigns, could you tell me more about. I started programming about 12 years ago and became a web developer […]

Pierluigi Paganini July 25, 2016
Hacker Interviews – Zilla from GhostSquadHackers

Enjoy my interview with the Zilla from GhostSquadHackers, I believe it is essential for cyber security experts to know how hackers work and why some of them are hunting the ISIS online. Zilla is another member of the #GhostSquadHackers, one of the hacker crews most active against IS propaganda online. You are a popular talented hacker […]

Pierluigi Paganini July 25, 2016
Bug hunter downloaded the entire Vine source code

The Indian security expert and bug hunter Avinash has accessed and downloaded the entire Vine source code and it was really easy. A hacker has accessed and downloaded the source code of the Twitter’s Vine application. Vine is a short-form video sharing service, acquired by Twitter in 2012, that allows users to share small videos of 6 seconds […]

Pierluigi Paganini July 24, 2016
Hacker Interviews – NeckrosTheTerrible

Let’s continue the series of interviews with talented hackers some of them like NeckrosTheTerrible are involved in anti-ISIS campaigns. NeckrosTheTerrible is a member of #GhostSquadHackers and currently involved in the #opTurkey campaign. Enjoy the Interview. You are a popular talented hacker that has already participated in several hacking campaigns, could you tell me more about. I been hacking […]

Pierluigi Paganini July 24, 2016
Akamai Threat Advisory – Evolution of DDoS attacks

According to the US-based Akamai Technologies Distributed Denial Of Service (DDoS) attacks have a great level of sophistication today. The Morris Worm of 1989 caused massive damage and losses with its unintentionally caused Denial Of Service (DoS) attacks. Fast forward to today, attacks have sharpened teeth targeting almost every IT service, from telco to gaming firms. […]