Hacking

Pierluigi Paganini April 13, 2016
Apple iMessage flaw exposed chat history and more with a single click

A group of security researchers has found a security flaw in the Apple iMessage that exposed chat history and sensitive data with a single click. Recently WhatsApp has introduced the end-to-end encryption to protect its users from eavesdropping, many other companies are adopting the technical improvement, but there are some circumstances that still open their customers to […]

Pierluigi Paganini April 13, 2016
British Govt vs Lauri Love, it’s battle for encryption keys

The British Government is attempting to force the hacktivist Lauri Love to hand over his encryption keys to access data stored in his seized laptop. Lauri Love is the hacktivist accused of breaking into Government networks, now the UK NCA wants to oblige him to hand over encryption keys to equipment seized from his home. The […]

Pierluigi Paganini April 12, 2016
How to restore files encrypted by the Petya ransomware in less than 7 seconds

Security Researchers have developed a decryption tool to restore the files encrypted by the Petya ransomware with a key generated in less than 10 seconds. Security researchers have analyzed the code of Petya ransomware in order to devise a method to allow victims to restore encrypted files. The experts have been able to develop a decryption tool […]

Pierluigi Paganini April 11, 2016
Bug Bounty Program is becoming more popular in Japan

Sprout, the cybersecurity firm in Japan has launched BugBounty.jp, which is the first bug bounty program in Japan designed to Japanese companies. Sprout, the cybersecurity firm in Japan has launched BugBounty.jp (https://bugbounty.jp/), which is the first bug bounty platform in Japan designed to Japanese companies easily run bug bounty programs, and get helps from white hat hackers around the […]

Pierluigi Paganini April 11, 2016
Researchers devised a reCaptcha breaking system effective against Google and Facebook

A group of boffins discovered vulnerabilities in the reCaptcha systems of Google and Facebook and devised an attack method. The security experts Suphannee Sivakorn, Iasonas Polakis, and Angelos D. Keromytis have devised an attack technique against Facebook and Google reCaptcha. The boffins from the Department of Computer Science at Columbia University have discovered security vulnerabilities […]

Pierluigi Paganini April 08, 2016
More than 135 million ARRIS cable modems vulnerable to remote attacks

Attackers can exploit the flaws in the ARRIS SURFboard cable modems to remotely knock out the device, more than 135 million device open to attacks. The security expert David Longenecker reported security vulnerabilities affecting the popular broadband cable SURFboard modems produced by the ARRIS (formerly Motorola). The ARRIS  SB6141 model is available for sale for around $70 US, […]

Pierluigi Paganini April 06, 2016
How to easily bypass iPhone 6s Lockscreen to access to Photos and Contacts

iPhone 6s and 6s Plus running the latest iOS version are plagued by a vulnerability that can be exploited to bypass the lockscreen. Another flaw plagues the new Apple iPhone 6s and 6s Plus, this time the mobile devices are affected by a Lockscreen Bypass vulnerability that could be exploited by local attackers to access […]

Pierluigi Paganini April 06, 2016
Homeland Security – US Consular Consolidated Database vulnerable to cyber attacks

According to the results of an internal review, the US passport and visa Consular Consolidated Database (CCD)  database is open to intrusion. According to the results of an internal review of the US State Department, the Consular Consolidated Database (CCD) is vulnerable to cyber attacks. The State Department considers the CCD as an “unclassified but […]

Pierluigi Paganini April 05, 2016
Flaw in CISCO FirePower Firewall allows malware evade detection

A flaw in the family of CISCO FirePower Firewall devices allows malware to bypass detection mechanism. Cisco is releasing security updates to fix a critical vulnerability (CVE-2016-1345) that affects one of its newest products, the FirePower firewall. The flaw has been discovered by security researchers at Check Point Security. According to the security advisory published by […]

Pierluigi Paganini April 04, 2016
DB with records of 50 Million Turkish Citizens Leaked Online. Are they recycled data?

A database containing records of 50 Million Turkish Citizens appeared online in the weekend. Is it a new or a recycled archive? Details of almost 50 Million Turkish citizens have been leaked online, the bulk data was hosted on a server with the IP address 185.100.87.84. The archive was published during the weekend, the publishers claim they it belongs […]