Hacking

Pierluigi Paganini August 17, 2015
The OwnStar Attack also works with BMW, Chrysler, Mercedes Cars apps

While the Ownstar attack has been fixed by GM, the same flaw affects also BMW Remote, Mercedes-Benz mbrace, and Chrysler Uconnect apps. Recently I wrote about the OwnStar attack presented by the popular hacker Samy Kamkar, a new gadget designed by the expert that could be exploited to hack GM Cars. The tool developed by Kamkar allows to locate […]

Pierluigi Paganini August 16, 2015
Dark marketplaces raked from $300,000 to $500,000 a day

A Study that will be presented at the USENIX Security Symposium shows that principal Dark marketplaces raked from $300,000 to $500,000 a day. We all remind the operation Onymous and the seizure of several black markets operated by law enforcement last year, despite the enormous effort spent every day by the authorities the illicit activities […]

Pierluigi Paganini August 15, 2015
Zero-Day in the Google Admin App can bypass Android sandbox

MWR Labs have disclosed information on an unpatched vulnerability that allows an attacker to easily bypass the Android sandbox. Other problems for the popular Android OS, after the discovery of the Stagefright vulnerabilities and other security flaws recently revealed by security researchers, now experts at MWR Labs have disclosed information on an unpatched vulnerability that allows […]

Pierluigi Paganini August 14, 2015
US authorities dismantled Insider Trading Ring Nets $100M

US authorities have identified and arrested members of an international ring of hackers and stock traders specialized in the theft of trading info. The Department of Justice charged a group of nine hackers and stock traders in a criminal conspiracy with making more than $30 million in illegal trades based on exfiltrated data. At the […]

Pierluigi Paganini August 13, 2015
Yet malicious software found on Lenovo PCs

Chinese computer manufacturers Lenovo has been caught once again using a hidden Windows feature to preinstall unwanted and unremovable rootkit. Lenovo firm was accused several times to supplying equipment for networks of the intelligence and defense services various countries that allowed the Chinese Government to run espionage operations. In 2013, Spy agencies reportedly have a long-standing […]

Pierluigi Paganini August 13, 2015
Carphone breach, bad actors run DDoS to cover the attack

Carphone Warehouse disclosed a sophisticated attack that may have impacted more than 2.4 million customers. Attackers covered the breach with DDoS attacks. On Saturday Carphone Warehouse (CW) was reportedly swamped by hackers than may have accessed personal and financial details of around 2.4 million customers according to the mobile retailer. The data breach affects customers […]

Pierluigi Paganini August 12, 2015
Attackers exploit a Windows flaw using a booby-trapped USB

Microsoft announced in the Tuesday’s bulletin that crooks have been exploiting a vulnerability that allows to execute malicious code using booby-trapped USB Microsoft announced in the last Tuesday’s bulletin that crooks have been exploiting a vulnerability that allows to execute malicious code using booby-trapped USB. The vulnerability affects all supported versions of Windows OS as […]

Pierluigi Paganini August 12, 2015
Facebook API flaw Left 1.44 Billion Users’ Identities at risk

A security flaw in the Facebook API allows hackers to decrypt and scan user IDs, nearly 1.44 billion Facebook users are at risk of identity theft. The security researcher Reza Moaiandin, Technical Director at Salt Agency, discovered a flaw in Facebook’s API that can allow hackers to scan for user ID, and that leaves about […]

Pierluigi Paganini August 11, 2015
VBE files on the rise in Brazil leading to Financial Fraud

Security experts at Kaspersky Lab recently observed a big wave of malicious VBE files targeting Brazilian users to distribute Financial Trojan. Recently security experts have seen old tricks rising from the dead (like for example word/excel macros attachment in e-mails) and malicious VBE files are being spread via email targeting Brazilian users. These VBE files […]

Pierluigi Paganini August 11, 2015
Aerial Assault Drone, the new Hacking Weapon presented at the Defcon

A new hacking machine is available in the arsenal of hackers it is an Aerial Assault drone that is able to automatically crack into wireless networks. David Jordan of US-based Aerial Assault presented was the Def Con conference an assault drone equipped with hacking tools. The vehicle could be used in hacking missions, for example by […]