Hacking

Pierluigi Paganini November 27, 2015
Nest camera, has a different definition for Turn off Mode

Findings of a research show that the Nest camera is still operating even after it has been disabled through the mobile application. People buy security cameras to have a higher level of control over their lives, but recently a research by a team at ABI Research found that users also must be worried about the […]

Pierluigi Paganini November 26, 2015
FBI is hunting MrGrey who has stolen 1.2 BILLION login credentials

The FBI is convinced that there is a single hacker behind the theft of login credentials for over 1.2 Billion online accounts, his name is MrGrey. According to a report published by the Reuters, the FBI is convinced that there is a single hacker behind the theft of login credentials for over 1.2 Billion online accounts, his […]

Pierluigi Paganini November 26, 2015
IoT devices are re-using cryptographic keys, leaving in danger millions of devices

Researchers from SEC consult analyzed more than 4000 firmware’s embedded devices, where is included devices belonging to 70 vendors. The findings are astonishing! Researchers from SEC consult analyzed more than 4000 firmware’s embedded devices, where is included devices belonging to 70 vendors. The categories of devices analyzed include Internet gateways, routers, modems, IP cameras, VoIP […]

Pierluigi Paganini November 26, 2015
Russia, Hackers Stole $4 Million in cash with Reverse ATM Hack method

Russian criminals Steal $4 Million In cash with a new technique dubbed reverse ATM Attack. Russian hackers have adopted a new technique, dubbed Reverse ATM Attack to steal Millions of dollars from ATMs of financial institutions. According to the experts at security firm GroupIB, the Reverse ATM Attack allowed criminal rings in Russia to steal 252 Million […]

Pierluigi Paganini November 25, 2015
How The Russian Abused Twitter as C&C in Hammertoss Malware? Python Answers

Today, we will replicate a technique which has been used by recent, sophisticated and hard to trace a Russian malware called Hammertoss. Today, we will replicate a technique which has been used by recent, sophisticated and hard to trace a Russian malware called Hammertoss, the creators of this malware has abused multiple well-known sites like Twitter […]

Pierluigi Paganini November 24, 2015
Notorious Shm00p hacker Claims he helped the FBI find ISIS Hacker Junaid Hussain

The hacker Shm00p claims he served as an FBI informant and helped the US law enforcement track down the hacker turned ISIS fighter Junaid Hussain. When dealing with ISIS and cyber capabilities, the first name that experts cite is Junaid Hussain, the hacker that was killed in a targeted US drone strike in August this year.Now new details on Junaid Hussain […]

Pierluigi Paganini November 23, 2015
TrueCrypt is safer than previous examinations suggest

A new security audit the TrueCrypt software confirmed that even if it is plagued by some vulnerabilities, the application is effective when it comes to protecting data. TrueCrypt, secure or insecure … that is the question. A group of Ten auditors from the Fraunhofer Institute for Secure Information Technology has conducted a six-month audit of TrueCrypt […]

Pierluigi Paganini November 21, 2015
Anonymous Took Down 20,000 pro-ISIS Twitter accounts

In the wake of Paris attacks Anonymous continues its campaign against the ISIS and announced to have taken down 20,000 pro-ISIS Twitter accounts. In the wake of Paris attacks the hacking collective Anonymous launched its offensive against the ISIS with the intent to interfere with the online propaganda and reveal the identity of its members. The #OpParis follows […]

Pierluigi Paganini November 21, 2015
SilverPush technology tracks user habits with near-ultrasonic sounds

The SilverPush technology allows advertising firm to track user habits with near-ultrasonic sounds.How does it work? A few days ago, the Center for Democracy and Technology (CDT) warned that the Indian company SilverPush has developed a technology that allows adverts to ping inaudible commands to mobile devices. SilverPush has issued also an SDK that could […]

Pierluigi Paganini November 20, 2015
The ISIS guide, how to stay secure online

Which are the technological tools used by the ISIS? Do the terrorists know how to avoid the surveillance online? The ISIS guide has the replies to these questions. In the wake of Paris attacks, intelligence agencies and law enforcement have raised again the debate about the encryption requesting IT giants to support them by introducing backdoors in their products. But […]