Hacking

Pierluigi Paganini November 04, 2013
Android 4.4 KitKat also affected by Master Key vulnerability

Security expert Jay Freeman discovered another Master Key vulnerability in Android 4.4 that allows attackers to inject malicious code in legit apps. The flaw known as “Android Master Key vulnerability” is considered a nightmare for Android OS, last July it was discovered for the first time and experts revealed that 99% of Android devices are vulnerable. The […]

Pierluigi Paganini November 03, 2013
SQL Injection, XSS and URL Redirect found in popular websites

Security Researcher Mohamed Osman Saeed has identified numerous vulnerabilities and reported them all, they include SQL Injection, XSS and URL Redirect. Security Researcher Mohamed Osman Saeed has identified numerous vulnerabilities and reported them all following an ethical conduct. The flaw interested principal security firms and private companies, following the complete list: Invalidated URL Redirect in […]

Pierluigi Paganini November 02, 2013
Finland’s Ministry of Foreign Affairs hit by extensive cyber espionage

Finland’s foreign minister announced that foreign intelligence agents had carried out large-scale cyber espionage into government communications. The Finnish Ministry of Foreign Affair networks has been targeted in a cyber espionage operation lasting at least four years, the news has been reported by the Finnish commercial broadcaster MTV3. Finland’s foreign minister Erkki Tuomioja confirmed the shocking news, a large […]

Pierluigi Paganini November 01, 2013
Anonymous OpNSA Campaign – OSINT to predict DDoS attacks on Nov 5th

  OpNSA analyzed with OSINT techniques based on the correlation of media activities and physical protests. The analysts provided a forecast on next attacks. Web Intelligence analysis alerts on early signs of an Anonymous cyber campaign dubbed OpNSA that as usual will address with DDoS attack principal US Government websites. Security experts don’t exclude the […]

Pierluigi Paganini October 30, 2013
Twitter Unrestricted File Upload Vulnerability

Security expert Ebrahim Hegazy has found another serious vulnerability in Twitter, he has discovered an Unrestricted File Upload Vulnerability. The popular Ebrahim Hegazy has found another serious vulnerability in Twitter, the cyber security analyst and Consultant at Q-CERT has discovered a flaw in the social media that allows Unrestricted File Upload. When a user creates a […]

Pierluigi Paganini October 30, 2013
Wi-Fi HTTP Request Hijacking attack against iOS users

Wi-Fi HTTP Request Hijacking attack against iOS – the researchers at Skycure have demonstrated a new technique that menaces mobile users. I’m not surprised for trust given by Internet users to public Wi-Fi networks that are notoriously insecure, wrong habits on the open networks could expose our identity to serious risks, one on all the identity theft. […]

Pierluigi Paganini October 29, 2013
Business Intelligence – Intro to reconnaissance

Exploring the Business Intelligence module proposed by the online course of the Hacker Academy – Intro to reconnaissance phase for a penetration testing. One of the most important components of the reconnaissance process in pen testing activity is the business intelligence. Once chosen the target it is important to gather business information on it before […]

Pierluigi Paganini October 28, 2013
Syrian Electronic Army hacked President Obama website and social media

Syrian Electronic Army Targeted President Obama’s website, Twitter and Facebook accounts and email account linked to his non-profit activities. Once again Syrian Electronic Army, the pro-Assad group claims it has hacked the President Barack Obama’s website, the social media accounts belonging to him on Twitter and Facebook and it violated the email accounts linked to […]

Pierluigi Paganini October 28, 2013
Israel – AP Exclusive reveals tunnel hit by cyber attack

Cybersecurity experts revealed that a major artery in Israel’s national road network located in the northern the city of Haifa suffered a cyber attack. Israel is considered one of the most advanced country in cyber security, but at the same time is a privileged target for hostile governments intent in sabotage and cyber espionage on […]

Pierluigi Paganini October 27, 2013
Subcontractors are for hackers the weakest link in security chain

Hackers use to target subcontractors to hit big enterprises due the poor level of security they offer, in the energy sector this trend is very concerning. Let’s follow the discussion on the hacking world and the way hackers impact business with their activities. We discussed about the role of hackers for companies and their employment […]