Hacking

Pierluigi Paganini November 05, 2014
Are Contactless Visa Cards exposed to risk of theft for 1M?

Researchers at the Newcastle University discovered a flaw in contactless Visa cards that can be exploited to steal up to 1M from cardholders without the PIN. A group of researchers at Newcastle University in the UK has discovered a hole in Contactless Visa Cards that could be exploited by cyber criminals to steal $1M per Card without knowing their PIN. The contactless credit […]

Pierluigi Paganini November 05, 2014
Two Linksys routers running SMART Wi-Fi Firmware are still vulnerable to remote attacks

Two models of Linksys routers running SMART Wi-Fi Firmware remain vulnerable to a pair of vulnerabilities recently patched by the company. Linksys EA2700 and EA3500 are the two routers running Linksys SMART Wi-Fi firmware that are still affected by a couple of vulnerabilities recently patched in different models of the Belkin-owned networking gear. On October 31th, […]

Pierluigi Paganini November 04, 2014
uIP and lwIP DNS resolver exposed to cache poisoning attacks

The DNS resolver implemented in the open source TCP/IP stacks uIP and lwIP is vulnerable to cache poisoning, the flaw could be exploited to divert traffic to malicious websites. The security researcher Allen D. Householder has reported  a serious vulnerability related to the uIP and lwIP DNS resolver, according to the Vulnerability Note VU#210620 it is exposed to cache […]

Pierluigi Paganini November 04, 2014
Apple OS X Yosemite is affected by a serious vulnerability

A Swedish security expert has discovered a serious  privilege escalation vulnerability in last Apple operating system, the OS X Yosemite. A Sweden white-hat has found a serious security flaw in Apple Yosemite OS X that could be exploited by an attacker to take control of your PC. The Swedish hacker Emil Kvarnhammar at security firm Truesec discovered a privilege […]

Pierluigi Paganini October 31, 2014
The number of Keyless cars thefts is rising

According to a UK motoring industry group and authorities keyless cars ‘increasingly targeted by thieves, which are using computers e dedicated equipment. According to a UK motoring industry group, criminal organizations are increasingly targeting high-end cars with keyless security systems.  The Society of Motor Manufacturers and Traders (SMMT) confirmed that car thieves are using dedicated equipment to access […]

Pierluigi Paganini October 31, 2014
ASUS Wireless Routers RT Series updates vulnerable to a Man in the Middle attack

The security expert David Longenecker discovered that the update process for ASUS Wireless Routers RT Series is vulnerable to Man-in-the-Middle attacks.  The security expert David Longenecker discovered that ASUS Wireless Routers RT Series are vulnerable to Man-in-the-Middle attacks. The researcher explained that that the routers download updates via HTTP without an encryption protocols as explained in the blog post by Longenecker. […]

Pierluigi Paganini October 30, 2014
Hackers infiltrated a White House unclassified computer network

According to an unnamed official at the White House, hackers infiltrated an unclassified network.The Obama Administration has confirmed the incident. An embarrassing incident involved the computer systems of the Obama Administration, according to the media an unclassified computer network used by the US government was infiltrated by hackers. The New York Times reported that an unnamed official working […]

Pierluigi Paganini October 27, 2014
The Fappening part 6 is out … a boring saga

The part 6 of the Fappening archive is online, it includes image of Nicola Peltz, Krysten Ritter, Angie Miller, Aubrey Cleland and Tobie Perciva. The effects of the Fappening, aka the iCloud Hack, are still evident in the cyberspace. Relentless hackers have released over the weekend a new archive, it is the part 6 of the […]

Pierluigi Paganini October 27, 2014
RRVS, Facebook and Yahoo work to prevent identity theft

Facebook and Yahoo have designed an SMTP extension dubbed RRVS, Require-Recipient-Valid-Since, to prevent illegal use of emails with a new  ownership. Last year Yahoo announced the decision to reset any account that has not been used for 12 months, making them available to other users. The decision has raised several doubts for security and privacy issues, […]

Pierluigi Paganini October 27, 2014
Russian Tor exit node patches with malware the files downloaded

The researcher Josh Pitts of Leviathan Security Group identified a Russian Tor exit node that is patching the binaries downloaded by the users with malware. Once again Tor network is under attack, the researcher Josh Pitts of Leviathan Security Group has identified a Tor exit node that was used to patch the binaries downloaded by the […]