Hacking

Pierluigi Paganini April 22, 2015
How to hack Avaya phones with a simple text editor

At RSA conference 2015 a researcher demonstrated that Avaya’s Ethernet office phones can be compromised with just a simple text editor. At the RSA conference 2015 in San Francisco, Dr Ang Cui from Columbia University PhD and Red Ballon Security cofounder announced that Avaya’s Ethernet office phones can be compromised with just a simple text […]

Pierluigi Paganini April 22, 2015
Spy in the sandbox attack to spy on your online activity

Four security researchers at the Columbia University have developed a new technique dubbed Spy in the sandbox attack to spy on victims’ online activity. Four security researchers at the Columbia University (Yossef Oren, Vasileios Kemerlis, Simha Sethumadhavan, and Angelos Keromytis) have developed a new technique to hack computer using a Javascript that allow them to […]

Pierluigi Paganini April 21, 2015
The hacker Stefan Esser shows the jailbreak for iOS 8.4 beta 1

The well-known hacker Stefan Esser, also known as iOn1c, first published a concept video of the jailbreak iOS 8.4 beta 1 running on iPhone 6. Apple has just released the iOS 8.4 beta version for its mobile devices and the popular hacker Stefan Esser, also known as i0n1c, has already released a jailbreak to the community of […]

Pierluigi Paganini April 21, 2015
Smart city systems could become a nightmare for security

Cyber security expert Cesar Cerrudo once again is warning the IT security community on the risks related to deployment of flawed Smart city systems. My readers know very well the cyber security expert Cesar Cerrudo that is author of several interesting studies on smart city systems, in August 2014 he presented a research on vulnerabilities affecting […]

Pierluigi Paganini April 20, 2015
How to use a malicious JPEG to hack corporate networks

Security researcher Marcus Murray discovered a method to exploit a malicious JPEG to compromise modern Windows servers inside corporate networks. Security expert and penetration tester Marcus Murray discovered a way to use a malicious JPEG to compromise modern Windows servers and elevate privileges over targeted networks. The researcher has demonstrated the attack a few days […]

Pierluigi Paganini April 19, 2015
APT28 Russian hackers exploited two zero-day flaws in the wild

FireEye recently detected a new highly targeted attack run by APT28 exploiting two zero-day flaws to compromise an “international government entity”. Security experts at FireEye have recently detected a new cyber espionage campaign, dubbed “Operation RussianDoll,” operated by the Russian APT28 group. This time the hackers run highly targeted attack by exploiting two zero-day vulnerabilities to target an “international […]

Pierluigi Paganini April 18, 2015
TheRealDeal black Marketplace Offers Zero-Day Exploits

A new deep web marketplace dubbed TheRealDeal has appeared and it is offering a platform for both sellers and buyers of the zero-day exploits. The anonymity ensured by the Dark Web and black markets it hosts is an element of attractive for cyber criminal and intelligence agencies. Black markets offer a wide range of illegal products and services, despite normal people believes that drugs and […]

Pierluigi Paganini April 17, 2015
In-flight Wi-Fi can be an open door for hackers

A report published by the Government Accountability Office (GAO) warns that the FAA faces some serious cyber security issues for modern flights. Security experts for a long time suspected that in-flight Wi-fi could create an entry door for hackers and a new report issued by The US Government Accountability Office (GAO) describes the dungeon of […]

Pierluigi Paganini April 17, 2015
Wikileaks released documents from Sony hack, the company condemned it

WikiLeaks on Thursday published a searchable database of more than 30,000 documents that were obtained by hackers in the cyber attack on Sony Pictures. WikiLeaks organization has leaked online a collection of documents stolen in the  Sony Pictures data breach, more than 30,000 files showing the inner workings of a “secretive” firm. WikiLeaks  published the […]

Pierluigi Paganini April 17, 2015
MS15-034 flaw leaves over 70 million sites vulnerable to cyber attacks

Security experts worldwide have discovered that threat actors are exploiting the Microsoft Zero-Day vulnerability MS15-034 in cyber attacks. Security researchers at SANS Internet Storm Center revealed that the critical remote code execution vulnerability MS15-034 affecting the Windows HTTP protocol stack is being actively exploited in the wild. The experts explained that the MS15-034 flaw affects […]