Hacking

Pierluigi Paganini March 03, 2016
RSA Conference Badge Scanning App has a default password hardcoded

Researchers at Bluebox Security discovered that the badge scanning application used at the RSA Conference 2016 includes a hardcoded default password. This year participants at the 2016 RSA Conference will have an ugly surprise, many vendors were provided with Samsung Galaxy S4 smartphones that run a special Android app, available on the Google Play, that allows them to […]

Pierluigi Paganini March 03, 2016
French Gov could fine Apple and Google €1m unless they hack mobile devices

French Gov is thinking a law that would impose fines of €1 million on Apple and Google if they refused providing access users’data. Governments worldwide continue to intensify their pressure on the IT giants requesting the access to users’ data in the name of security. The US Government wants Apple unlock its mobile devices to access data, the […]

Pierluigi Paganini March 02, 2016
US DoD invites a restricted number of hackers to Hack the Pentagon

Hack the Pentagon – DoD would invite outside hackers to test the cybersecurity of some public US Defense Department resources as part of a pilot initiative. Which is the best way to discover security vulnerabilities affecting a computer system? Ask a group of hackers to test it. This is the concept behind a bounty program, […]

Pierluigi Paganini March 02, 2016
33 percent of all HTTPS websites open to DROWN attack

Security experts presented the DROWN attack that exploits a new critical security vulnerability affecting the OpenSSL. Security experts have discovered a new critical security vulnerability affecting the OpenSSL, it has been estimated that more than 11 Million websites and e-mail services are open to cyber attacks. The new attack, dubbed DROWN (stands for Decrypting RSA with […]

Pierluigi Paganini February 29, 2016
Using the Microsoft EMET security tool to hack itself

The security researchers at FireEye Abdulellah Alsaheel and Raghav Pande have found a way to exploit Microsoft EMET (Enhanced Mitigation Experience Toolkit) to hack itself. The security researchers at FireEye security Abdulellah Alsaheel and Raghav Pande have found a way to exploit the Microsoft security tool Enhanced Mitigation Experience Toolkit to hack itself. The Enhanced Mitigation […]

Pierluigi Paganini February 29, 2016
Chinese ISPs are redirecting users legitimate traffic to malicious sites/ads

Chinese ISPs (internet service providers) are redirecting users legitimate traffic to malicious websites serving malware and ads. China is know to be not very “ortodox” when talking about freedom on the internet, over the time, it developed numerous projects to monitor users’ activity. The Great Firewall Now three Israeli researchers uncovered that Chinese ISPs (China Telecom […]

Pierluigi Paganini February 29, 2016
A journalist has been hacked on a plane while writing an Apple-FBI story

The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises the discussion on privacy. Experts in the aviation industry are spending a significant effort in the attempt of improving cyber security. The news that I’m going to tell you has something of incredible. The American journalist […]

Pierluigi Paganini February 28, 2016
German authorities approve the use of home-made Federal Trojan

The German Interior Ministry has approved the use of a federal Trojan developed by the German Federal Criminal Police. The German Interior Ministry has approved the use a spyware developed by the German Federal Criminal Police, aka the ‘federal Trojan’ or Bundestrojaner, for the investigative purpose. “Soon the state could re-enter the computer of suspicious […]

Pierluigi Paganini February 27, 2016
Securing Hospitals from hackers that can put lives in dangers

Securing Hospitals is a report issued by Independent Security Evaluators that demonstrates how hackers can hack hospitals putting lives in danger. A group of experts from the Independent Security Evaluators research team have tested the security of hospital networks, demonstrating how it is possible to gain access to critical medical equipment in attacks they say could put lives in danger. […]

Pierluigi Paganini February 26, 2016
Wikileaks – NSA tapped world leaders for US geopolitical Interests

The NSA tapped world leaders for US Geopolitical Interests, including a conversation between Netanyahu-Berlusconi over the U.S.-Israel Relations. A couple of days ago the non-profit journalistic organisation WikiLeaks published a collection of highly classified documents that reveals the NSA targeted world leaders for US Geopolitical Interests. Some of the intercepts are classified TOP-SECRET COMINT-GAMMA, these are most […]