Hacking

Pierluigi Paganini August 11, 2014
F-Secure discovered Xiaomi handset spying on users’data

Experts at F-Secure security firm analyzing the new Xiaomi RedMi 1S discovered that it sends out to a server located in China a lot of user’s data. Xiaomi, one of the most important Chinese smartphone manufacturers is accused for secretly steal users’ data and send it back to a server in China, despite the company has turned […]

Pierluigi Paganini August 11, 2014
Sophisticated evasion techniques adopted in the Op Poisoned Hurricane

Researchers at FireEye have uncovered a new campaign dubbed Poisoned Hurricane characterized by the use of some clever techniques to avoid being detected. Security experts at FireEye revealed that several Internet infrastructure service providers in the United States and Asia, a financial institution, a government organization located in Asia and a US-based media company suffered […]

Pierluigi Paganini August 10, 2014
Malicious Facebook color changer App infected 10000 Users worldwide

Security Experts at Cheetah Mobile have uncovered a new scam based on a fake Facebook Color Changer App which infected 10000 users worldwide. Facebook  is a privileged target for cyber criminals, in many cases old fraud schema are proposed again by bad actors, it is the case of the bogus Facebook “Color Changer” app. Researchers at China-based Internet company […]

Pierluigi Paganini August 10, 2014
Attacks on ISP Networks allows to steal $83,000 from Bitcoin Mining pools

Researchers at Dell SecureWorks Counter Threat Unit discovered a theft of Bitcoin made hijacking networks of at least 19 Internet service providers. With the rise of Bitcon value has increased the interest of cybercrime, since now we have read of botnet able to mine virtual currency with victim’s resources and malicious codes able to steal Bitcoin […]

Pierluigi Paganini August 08, 2014
Poweliks the persistent malware which doesn’t install any file

Experts at GData discovered Poweliks, a persistent malware able to infect machines without installing any files on the targeted machine. Researchers at GData software have discovered a new surprising strain of malware named Poweliks which is able to infect systems and steals data without installing any file onto the victim’s machine. This malware maintains persistence storing its components […]

Pierluigi Paganini August 07, 2014
WordPress and Drupal websites Vulnerable to DoS attack which can make them completely inaccessible

The popular expert Nir Goldshlager has discovered an XMLRPC vulnerability which affects millions WordPress and Drupal websites exposing them to DoS Attack. If your website is based a WordPress or Drupal CMS you need to urgently update it to the last version released due to the presence of a critical vulnerability in the implementation of […]

Pierluigi Paganini August 07, 2014
FBI infected PCs on a large scale to persecute alleged criminals

A report disclosed by Wired suggests that the FBI is using a malware to identify Tor users by infecting machines on a large scale. It’s not a mystery that usage of the Tor network represents a problem for investigators of law enforcement agencies and for government entities that need to track users on the popular anonymizing network. […]

Pierluigi Paganini August 06, 2014
Russian crime ring amasses over a Billion credentials

Experts at Hold Security firm discovered a Russian group of hackers that collected 1.2B stolen credentials obtained in different data breaches worldwide. Experts at Hold Security revealed to have discovered the biggest database of stolen user names and passwords and email addresses, the news is reported by The New York Times that hired an independent security expert who verified […]

Pierluigi Paganini August 06, 2014
Security flaw allows to bypass PayPal two-factor authentication

A Security researcher has discovered a new flaw in the two-factor authentication process implemented by PayPal to protect its users. Security researcher Joshua Rogers has discovered a simple way of bypassing the two-factor authentication mechanism implemented by PayPal to protect accounts that are linked to eBay accounts. The flaw resides in the login process when a user is prompted […]

Pierluigi Paganini August 05, 2014
Hacking satellite communications equipment on passenger jets

Cyber security expert claims to be able access satellite communications equipment on passenger jets through their WiFi and in-flight entertainment systems. Airplanes Can Be Hacked Through Wireless In-flight Entertainment System, this is not a new discovery as I explained in a post published more that one year ago and titled “Cyber Threats against the Aviation […]