Hacking

Pierluigi Paganini July 16, 2015
The newest RC4 attack is a nightmare for certain HTTPS implementations

The newest RC4 attack is a nightmare for certain HTTPS implementations, almost a third of the world’s encrypted Web connections can be cracked. We have written several times about RC4 encryption that has been accused of being a Cryptographic disaster, now two Belgian security researchers from the University of Leuven did another discovery that highlights […]

Pierluigi Paganini July 16, 2015
One of the Epic Games Forums has been hacked

Epic Games announced that one of the forum websites it maintains has been hacked and the attackers have gained access to users’ sensitive data. Epic Games is one of the most popular video game development companies, Unreal Tournament, Jazz Jackrabbit, Gears of War, and Infinity Blade are the most popular game series designed by the gaming […]

Pierluigi Paganini July 15, 2015
Law enforcement arrested dozens people from Darkode crime forum

An international joint effort of law enforcement allowed the arrest of dozen people active on the popular Darkode crime forum. A joint operation run by the FBI and other law enforcement agencies in Europe and Brazil have allowed the identification and the arrest of more than 60 people suspected of carrying out hacking crimes. According to […]

Pierluigi Paganini July 11, 2015
Three UK politicians hacked while using open WiFi networks

A team of experts hacked three UK politicians while they were using unsecured WiFi networks to demonstrate the risks they are daily exposed. Public Wi-Fi networks are dangerous places for our digital identity, we have explained several times the risks related to the connections to open WiFi hotspots. Security  experts have explained these risks to […]

Pierluigi Paganini July 11, 2015
Wekby APT attacks leverage Hacking Team exploits

According to the experts at Volexity the Flash Player exploit has been leveraged in spear phishing campaign launched by the Wekby APT. As anticipated, several criminal gangs included the code for the exploitation of CVE-2015-5119 vulnerability in their exploit kits, let’s remember that the exploits code was disclosed as the result of the attack against the Hacking […]

Pierluigi Paganini July 10, 2015
Hackers give orders to a German Patriot missile system

Patriot missile systems stationed in Turkey near the Syrian Border were briefly taken over by hackers according to the Behorder Spiegel magazine According to the Behorder Spiegel magazine, hackers were able to send “unexplained” orders to the Patriot missiles stationed in Turkey. The Patriot missiles are part of the anti-aircraft system, the systems are manufactured in […]

Pierluigi Paganini July 09, 2015
Hacking Team Zero-Day tied to attacks In Korea and Japan

Security experts at Trend Micro revealed that one of the exploits discovered in the Hacking Team package tied to Attacks In Korea and Japan. Following the recent hack of the popular surveillance firm Hacking Team, the experts started the analysis of the material leaked online by the attackers. The package leaked online include also a number […]

Pierluigi Paganini July 09, 2015
Shodan, the Google of the Internet of Things

Google finds websites meanwhile Shodan finds devices exposed on the web, including Internet of Things devices, that’s why hackers love it! In 2009 John Matherly introduced the Shodan search engine, and at the time the media commented this with doubts and suspicion. Shodan indexes the information related devices exposed on the internet in the same way […]

Pierluigi Paganini July 08, 2015
Hacking Team Flash Zero-Day exploits are being used in the wild

Security experts confirmed that Adobe Flash vulnerability revealed in the recent attack against the Hacking Team is being used in the wild. Every IT security website is publishing information related to the recent hack of the Hacking Team and consequent exfiltration of more than 400 GB of sensitive data. The most scaring scenario is already […]

Pierluigi Paganini July 08, 2015
Linux, Apache, MySQL is all that evil XKeyscore needs to control the world

According to new revelations of the popular whistleblower Edward Snowden the powerful spying machine XKEYSCORE runs on Red Hat Enterprise Linux. In August 2013, Edward Snowden revealed the existence if a tool named DNI Presenter that allows the Agency to read the content of stored emails, and it also enables the intelligence analysts to tool collects […]