Hacking

Pierluigi Paganini May 16, 2015
Polish firm disclosed PoC code for security issues in Google App Engine

Security researchers at Security Explorations firm have published PoCs code for some of security issues in the Google App Engine. The Polish firm Security Explorations has published online the technical details and a proof-of-concept code for security flaws affecting the Google App Engine (GAE) for Java. “Security Explorations decided to release technical details as well as […]

Pierluigi Paganini May 15, 2015
Cyberattacks on Oil and Gas Firms Launched with no Malware at all

Oil and gas industry targeted by hackers with a genuine looking windows file, not a malware. The attacks are ongoing for about two years. A unique targeted attack being underway for about two consecutive years exploits Windows file functions that look legitimate and a couple of homemade scripts – but not malware – in order […]

Pierluigi Paganini May 15, 2015
Remotely Exploitable flaws affect SAP solutions

SAP products make use of a proprietary implementation of LZC and LZH compression algorithms that could be exploited by attackers in several ways. For the second time in a week, we are speaking about security vulnerabilities affecting SAP systems, recently I wrote about a study published by the Onapsis firm that revealed over 95% of SAP […]

Pierluigi Paganini May 13, 2015
VENOM flaw, millions of virtual machines are vulnerable to attack

Security Researcher at CrowdStrike claims VENOM vulnerability leaves millions of virtual machines vulnerable to cyber attacks. A new security vulnerability dubbed VENOM (CVE-2015-3456) is threatening the security industry. The CrowdStrike Senior Security Researcher Jason Geffner who discovered the vulnerability explained that the flaw could be exploited by an attacker to compromise any machine is a data […]

Pierluigi Paganini May 13, 2015
Mass-Scale Abuse of poorly configured SOHO Routers

Several dozen Imperva Incapsula customers were targeted by a DDoS botnet comprised of tens of thousands of hijacked SOHO routers. Security experts at Incapsula firm spotted a DDoS botnet composed of tens of thousands of malware-infected Small Office / Home Office SOHO routers engaged in application layer HTTP flood attacks. The SOHO routers were infected with a strain […]

Pierluigi Paganini May 12, 2015
How quantum computing will improve credit card security

Quantum computing in credit cards introduces a new type of encryption (quantum cryptography) that will make magnetic strips and EVS solutions obsolete. Nowadays getting credit card credentials it’s not difficult and you don’t need to have technical skills, you can just buy them in the dark web, but that’s may change in the future thanks […]

Pierluigi Paganini May 10, 2015
Hiring hackers, how much is it?

In recent years the perception of the role of hackers is completely changed, in the past these high-skilled professionals were viewed as dangerous threats that needed to be kept at arm’s length, meanwhile today they are highly sought from private companies and intelligence agencies. “An increasingly large number of modern business operations rely on an understanding of the […]

Pierluigi Paganini May 09, 2015
GPS used to locate a gang using gas pump skimmers

Law enforcement identifies and located suspects members of a criminal organization that used gas pump skimmers, by using the GPS technology. The number of attacks against ATMs located in supermarkets and Gas pumps is constantly increasing, the crooks use credit and debit card skimmers that use different technologies to steal card data and steal them. Today […]

Pierluigi Paganini May 09, 2015
Facebook Friends Mapper – How to crawl Hidden Friends

Hackers have a new tool in their arsenal dubbed Facebook Friends Mapper that allows them to crawl Facebook Hidden Friends list just in a click. Facebook users can protect their privacy by setting the “privacy level” for every information related their profile or content they post online. Users can decide to completely set as private the information in […]

Pierluigi Paganini May 08, 2015
Flawed Open Smart Grid Protocol is a risk for Smart Grid

More than four million smart meters and similar devices worldwide are open to cyber attacks due to the security issued in the Open Smart Grid Protocol. The Open Smart Grid Protocol (OSGP) is a family of specifications published by the European Telecommunications Standards Institute (ETSI) that are implemented today by more than four million smart […]