Hacking

Pierluigi Paganini July 08, 2015
Sophos discovered new tricks to poison Google Search engine

Hackers are using a new search engine poisoning method to circumvent Google’s page ranking-algorithms, the technique relies on PDF documents. Researchers from Sophos discovered the new search poisoning method used to circumvent cloaking-detection mechanisms implemented by Google. The experts found hundreds of thousands of unique PDF documents per day implementing the poisoning technique. The term cloaking indicates the […]

Pierluigi Paganini July 08, 2015
Hackers’ capability to crash trains raises security concerns, malware could lead to train crashes in the UK

Cyber attacks can crash trains. Intense security concerns have emerged, after the upgrade of the British railway network that can be affected by malware. The new railway network upgrade in the United Kingdom has raised a lot of concerns, as far as its overall network security is concerned. It seems that over thirty million pounds […]

Pierluigi Paganini July 07, 2015
Adobe Zero-Day Exploits leaked in Hacking Team hack

Researchers discovered several exploits in the data stolen from the Hacking Team, including ones for zero-day vulnerabilities. The recent hack of the Hacking Team firm has caused the exposure of 400GB of corporate data which includes source code (GitHub repository), emails and other sensitive documents belonging to the surveillance software firm. According to security experts at Trend Micro, the […]

Pierluigi Paganini July 05, 2015
Cisco Unified CDM platform open to cyber attacks

Cisco Unified CDM software contains a privileged account with a static password that cannot be changed, by using it an attacker can control the platform. A default privileged account with a static password that cannot be changed affect the  Cisco Unified Communications Domain Manager (Cisco Unified CDM) opening the platform for remote attacks. The Cisco […]

Pierluigi Paganini July 05, 2015
Anonymous India hacked BSNL website and compromised more than 30 Million records

Anonymous India hacked the BSNL Telecommunications Journal website and claims to have compromised more than 30 million records. The website of the BSNL Telecommunications Journal has been hacked by the hacktivists of the Indian Anonymous arm named AnonOpsIndia. Anonymous India the BSNL journal website to protest against the surveillance programs operated by the Indian Government. […]

Pierluigi Paganini July 04, 2015
US power grid vulnerable to cyber attacks

The former Secretary of Defense William Cohen revealed that the US power grid is vulnerable to terror attacks, a major cyber attack was a matter time. Security experts and US politicians are aware that the power grid is vulnerable to a terrorist attack. Nation’s power grid is a privileged target for terrorists as explained by the former […]

Pierluigi Paganini July 02, 2015
Unknowns are cloning and booby trapping hundreds of Dark Web sites

Founder of the ahmia.fi project reported that someone is cloning and booby trapping hundreds of Dark Web sites and is re-writing some of the content. The “ahmia.fi” project census Dark Web websites, aka hidden services, by providing search engine functionalities by indexing the content present on the Tor network. Nurmi noticed an anomalous number of clones of hundreds […]

Pierluigi Paganini July 02, 2015
Flaw in 802.11n opens wireless networks to remote attacks

Researchers discovered a vulnerability in the 802.11n wireless networking standard that could be exploited by a remote attacker to target wireless networks. According to researchers from the Expertise Centre for Digital Media at the Hasselt University in Belgium, the frame aggregation mechanism implemented by the 802.11n wireless networking standard is affected by a security a […]

Pierluigi Paganini July 01, 2015
Apple issues a fix for Masque Attacks, but apps are still open to hack

Although Apple has fixed the Masque Attack there are still other attack scenarios that an attacker can exploit in the installation process on iOS. A team of researchers at FireEye has revealed that the last update issued by Apple only partially fixed the two vulnerabilities exploited in the Masque Attack (CVE-2015-3722/3725, and CVE-2015-3725). The two exploits […]

Pierluigi Paganini July 01, 2015
NIT, the Flash code the FBI used to deanonymize pedo’s on Tor

A look to the “NIT Forensic and Reverse Engineering Report, Continued from January 2015”. NIT code was used by the FBI to deanonymize Tor users. On December 22nd, 2014 Mr. Joseph Gross retained the assistance of Dr. Ashley Podhradsky, Dr. Matt Miller, and Mr. Josh Stroschein to provide the testimony as the expert in the process […]