Hacking

Pierluigi Paganini August 10, 2014
Malicious Facebook color changer App infected 10000 Users worldwide

Security Experts at Cheetah Mobile have uncovered a new scam based on a fake Facebook Color Changer App which infected 10000 users worldwide. Facebook  is a privileged target for cyber criminals, in many cases old fraud schema are proposed again by bad actors, it is the case of the bogus Facebook “Color Changer” app. Researchers at China-based Internet company […]

Pierluigi Paganini August 10, 2014
Attacks on ISP Networks allows to steal $83,000 from Bitcoin Mining pools

Researchers at Dell SecureWorks Counter Threat Unit discovered a theft of Bitcoin made hijacking networks of at least 19 Internet service providers. With the rise of Bitcon value has increased the interest of cybercrime, since now we have read of botnet able to mine virtual currency with victim’s resources and malicious codes able to steal Bitcoin […]

Pierluigi Paganini August 08, 2014
Poweliks the persistent malware which doesn’t install any file

Experts at GData discovered Poweliks, a persistent malware able to infect machines without installing any files on the targeted machine. Researchers at GData software have discovered a new surprising strain of malware named Poweliks which is able to infect systems and steals data without installing any file onto the victim’s machine. This malware maintains persistence storing its components […]

Pierluigi Paganini August 07, 2014
WordPress and Drupal websites Vulnerable to DoS attack which can make them completely inaccessible

The popular expert Nir Goldshlager has discovered an XMLRPC vulnerability which affects millions WordPress and Drupal websites exposing them to DoS Attack. If your website is based a WordPress or Drupal CMS you need to urgently update it to the last version released due to the presence of a critical vulnerability in the implementation of […]

Pierluigi Paganini August 07, 2014
FBI infected PCs on a large scale to persecute alleged criminals

A report disclosed by Wired suggests that the FBI is using a malware to identify Tor users by infecting machines on a large scale. It’s not a mystery that usage of the Tor network represents a problem for investigators of law enforcement agencies and for government entities that need to track users on the popular anonymizing network. […]

Pierluigi Paganini August 06, 2014
Russian crime ring amasses over a Billion credentials

Experts at Hold Security firm discovered a Russian group of hackers that collected 1.2B stolen credentials obtained in different data breaches worldwide. Experts at Hold Security revealed to have discovered the biggest database of stolen user names and passwords and email addresses, the news is reported by The New York Times that hired an independent security expert who verified […]

Pierluigi Paganini August 06, 2014
Security flaw allows to bypass PayPal two-factor authentication

A Security researcher has discovered a new flaw in the two-factor authentication process implemented by PayPal to protect its users. Security researcher Joshua Rogers has discovered a simple way of bypassing the two-factor authentication mechanism implemented by PayPal to protect accounts that are linked to eBay accounts. The flaw resides in the login process when a user is prompted […]

Pierluigi Paganini August 05, 2014
Hacking satellite communications equipment on passenger jets

Cyber security expert claims to be able access satellite communications equipment on passenger jets through their WiFi and in-flight entertainment systems. Airplanes Can Be Hacked Through Wireless In-flight Entertainment System, this is not a new discovery as I explained in a post published more that one year ago and titled “Cyber Threats against the Aviation […]

Pierluigi Paganini August 05, 2014
China bans Symantec & Kaspersky from the list of antivirus suppliers

China has excluded Symantec Corp and Kaspersky Lab from a list of approved antivirus software suppliers to limit the use of foreign technology. Cyber espionage is the first concern of government, China and US exchanged in the months reciprocal accusations on a series of hacking campaign conducted with the purpose of stealing sensitive information. According to the People’s Daily […]

Pierluigi Paganini August 04, 2014
Billion devices could be controlled with built-in management tools by hackers

Security researchers have discovered that billions mobile devices could be remotely controlled due the presence of a built-in management tool. Two researchers at Accuvant Labs, Mathew Solnik and Marc Blanchou, have recently discovered the existence of built-in vulnerabilities in a large number of mobile devices that would allow an attacker to gain complete control of […]