Hacking

Pierluigi Paganini February 08, 2015
Samsung SmartTV models transmit voice, and more, to a third-party service

Samsung SmartTV transmits data to a third party, be aware that if your spoken words include personal or other sensitive information. We have discussed several times about the privacy and security issues related to the Internet of Things devices, Smart meters and Smart TV are intelligent devices that could be exploited by hackers to collect our sensitive […]

Pierluigi Paganini February 07, 2015
11 percent of mobile banking apps includes harmful code

A recent study published by RiskIQ security firm revealed that more than 11 percent of mobile banking apps includes harmful code. With the rapid spread of mobile banking services has increased significantly the number of cyber crimes targeting users of major financial institutions. According to an interesting research conducted by the company RiskIQ more than 11 […]

Pierluigi Paganini February 05, 2015
Sony Pictures hacked by Russian blackhats, it now emerges

After months of suspects a new revelation on Sony hack states that Russian hackers hacked and still have access to Sony Pictures Entertainment’s network. Sony Pictures Entertainment might have been hacked by Russian blackhat hackers and not the Democratic People Republic of Korea. This news emerged this week after renowned Russian blackhat YamaTough revealed that a […]

Pierluigi Paganini February 05, 2015
Risks related to the use of digital certificates

A recent report published by experts at Kaspersky Lab revealed that the number of abuses for digital certificates is in constant increase. According to a recent report published by Kaspersky Lab the number of untrusted certificates used to sign malicious code is doubled in the last year. The reason is that there is the wrong […]

Pierluigi Paganini February 04, 2015
Severe XSS flaw affects fully patched Internet Explorer

Security experts discovered a new severe XSS flaw affects fully patched Internet Explorer and exposes users to risks of attacks and identity theft. A new critical cross-site scripting (XSS) vulnerability affects fully patched versions of Internet Explorer, the flaw could be exploited by hackers to steal user sensitive data (i.e. login credentials) and inject malicious […]

Pierluigi Paganini February 03, 2015
About.com affected by XSS, XFS, Open Redirect Vulnerabilities since October 2014

The popular website About.com is affected by numerous security flaws that expose its users to XSS, XFS, Open Redirect attacks since October 2014. Wang Jing, a PhD student at the Nanyang Technological University in Singapore has discovered that the majority of the web page of About.com are vulnerable different types of attacks, including cross-site scripting […]

Pierluigi Paganini February 02, 2015
BMW fixes security flaw in 2.2 million car software

A security vulnerability in the BMW Connected Drive system allowed security experts to send remote unlocking instructions to the cars. Modern cars are complex systems composed of several components interconnected by internal networks, each system within these architectures is exposed to the risk of cyber attacks. Recently the German carmaker BMW has fixed a security […]

Pierluigi Paganini January 31, 2015
Hacking sex toys and dolls

The security expert Ken Munro has run a series of penetration tests on sex toys and dolls for children … the results are disconcerting. Everything that could be connected to a computer could be potentially exploited to hack it, we read about several cases that demonstrated how it is possible to compromise a PC by […]

Pierluigi Paganini January 28, 2015
Official NFL apps (both iOS and Android) Vulnerable to Easy Hacking

It is now emerging that the official NFL app for IOS and Android is vulnerable to easy hacking. The app apparently sends unencrypted data to NFL servers and can therefore be hacked by anyone monitoring user traffic. With only a few days remaining before the Superbowl, it is now emerging that the fans might be […]

Pierluigi Paganini January 28, 2015
Ghost Remote Code Execution Vulnerability scares the Linux community

The Linux GNU C Library (glibc) versions prior to 2.18 are affected by the GHOST remote code execution vulnerability present in the ‘gethostbyname’ function. A new critical vulnerability is threatening the Linux community, the flaw affects the glibc GNU C library. The vulnerability is present in all Linux systems dating back to 2000 and could […]