Hacking

Pierluigi Paganini June 07, 2016
Hackers can remotely disable car alarm on Mitsubishi Outlander PHEV SUVs

Hackers discovered it is possible to remotely control features of Mitsubishi Outlander PHEV by hacking the mobile applications designed by the car vendor. A team of experts from the UK security firm Pen Test Partners has demonstrated that it is possible to remotely control some feature of the popular SUV Mitsubishi Outlander plug-in hybrid electric vehicle […]

Pierluigi Paganini June 06, 2016
Charging Mobile Devices could be very risky according to Kaspersky

Experts from Kaspersky Lab have conducted an experiment to demonstrate the risks for charging mobile devices with untrusted USB charging points and PCs. A simple operation like charging mobile Smartphone could expose users at serious risks. It is not a novelty, mobile devices could be hacked while owners are charging them by using a standard […]

Pierluigi Paganini June 05, 2016
Jacob Appelbaum leaves the Tor Project after accusation of sexual misconduct

The popular Tor developer Jacob Appelbaum left the Core Team of the Tor Project after “sexual mistreatment” allegations. Appelbaum is recognized as one of the most active and influential digital advocates and security researchers. He is one of the few reporters to have had a preview of the NSA secret documents leaked by Edward Snowden. The news is […]

Pierluigi Paganini June 05, 2016
Sh0ping.su hacked, stolen card data and accounts available for sale

The notorious crime forum Sh0ping[.]su has been hacked by unknowns that leaked online credit card data and stolen accounts. Data breaches are a common problem also for bad actors, in many cases cyber criminals hack websites of competitors to damage their reputation and push out them from the business. Recently we discussed the hacks of […]

Pierluigi Paganini June 05, 2016
Old CVE-2014-3704 flaw in Drupal still exploited in attacks

More than 19 months after its public disclosure the CVE-2014-3704 is still exploited in attacks against Drupal-based websites. It was October 2014, when Drupal patched a critical SQL injection vulnerability (CVE-2014-3704) that was affecting all Drupal core 7.x versions up to the recently-released 7.32 version, which fixed the issue. The patch issued by Drupal fixed the […]

Pierluigi Paganini June 04, 2016
How to steal encryption keys from the air through a PC’s noises

A group of Israeli researchers demonstrated how to steal RSA encryption keys through a PC’s noises during cryptographic operations. If you think that air-gapped networks are totally secure you are wrong, in the past, many research teams have devised methods to steal data from computers disconnected from the Internet. They demonstrated that it is possible […]

Pierluigi Paganini June 03, 2016
GhostShell is back and leaked 36 million records

GhostShell is back and leaked 36 million records from vulnerable networks to invite experts to pay attention to the new MEAN Stack. GhostShell is back and once again to warn us about the poor security posture of many services, this time, he announced to have leaked 36 million accounts/records. The hacker is inviting experts to pay attention to […]

Pierluigi Paganini June 03, 2016
Unlimited surveillance capabilities, but it’s going to cost you

Israeli company Ability Unlimited Interception System (ULIN) promises unlimited surveillance capabilities on any cell phone on the planet. Israeli-based company Ability is planning a big marketing push aimed at law enforcement in the United States.  Ability Unlimited Interception System (ULIN) promises unlimited surveillance capabilities of revealing the location, calls, and texts of any cell phone […]

Pierluigi Paganini June 02, 2016
TeamViewer hacked? The company officially denies it

Many TeamViewer users reported that their systems were accessed by hackers via the popular support tool, but the company denies any incident. Many TeamViewer users reported that their systems were accessed by hackers via the popular support tool, but the company denies any security breach. First claims appeared on Reddit, several users reported that unauthorized parties remotely accessed […]

Pierluigi Paganini June 02, 2016
Lenovo Accelerator Application contains a bug that allows remote hack of your PC

A study of Duo Security revealed that Lenovo Accelerator Application support tool contains a high-risk flaw that allows remote code execution. Once again bad news for Lenovo users, the company is informing them that the Lenovo Accelerator Application contains a high-risk vulnerability that could be exploited by hackers to remotely execute code on the machine and […]