Hacking

Pierluigi Paganini October 27, 2013
Subcontractors are for hackers the weakest link in security chain

Hackers use to target subcontractors to hit big enterprises due the poor level of security they offer, in the energy sector this trend is very concerning. Let’s follow the discussion on the hacking world and the way hackers impact business with their activities. We discussed about the role of hackers for companies and their employment […]

Pierluigi Paganini October 25, 2013
US government released draft for NIST cybersecurity framework

NIST released the draft of cybersecurity framework, which outlines how private companies can protect themselves against cyberattacks, and security breaches. The National Institute of Standards and Technology has released a draft of the cybersecurity framework for private companies and infrastructure networks as part of  President Obama’s executive order. The order has the primary goal to improve the […]

Pierluigi Paganini October 24, 2013
Cyber Threat summit 2013 – Modern online-banking cybercrime

“Modern online-banking cybercrime” -The presentation analyzes current context for cybersecurity in Banking focusing on cyber threats and countermeasures. Today I presented at Cyber Threat Summit 2013 the topic “Modern online-banking cybercrime“, the presentation analyzes current context for cybersecurity in Banking focusing on cyber threats and countermeasures. The agenda is: Intro Phishing attacks Malware Based Attacks […]

Pierluigi Paganini October 24, 2013
uProxy, Digital Attack Map and Project Shield,Google to secure the web

Google has just revealed the details on tree new technologies, uProxy, Digital Attack Map and Project Shield, to secure the web and to fight censorship. This week Google launched the Project Shield, an initiative sustained by the company to protect enterprises from DDoS attack that are becoming a serious problem for Internet infrastructures. Google is […]

Pierluigi Paganini October 22, 2013
Facebook FBStalker tool uses Graph Search for powerful OSINT analysis

Experts Werrett and Lee demonstrated how to conduct a powerful analysis using FBStalker, a tool created to find a comprehensive amount of data on any Facebook user. Facebook, and more in general social networks, is a platform that if not properly managed could harm user’s privacy, the fact that also friends’ social behavior could have […]

Pierluigi Paganini October 21, 2013
Root access backdoor discovered in Chinese Tenda Wireless Routers

Craig Heffner has discovered a new backdoor in the Wireless Routers produced by China based networking device and equipment manufacturer Tenda Technology. Just a week ago I wrote on a serious backdoor found by researcher Craig Heffner within the D-Link routers, today I’m here describing a new flaw discovered in the Wireless Routers produced by China […]

Pierluigi Paganini October 20, 2013
Original fishing scheme against Poste Italiane

Security Experts at Sophos have detected a new phishing campaign against the Italian brand Poste Italiane that makes use of an efficient social engineering technique. Sophos experts detected this week an intriguing case of phishing against the Italian postal service Poste Italiane, the scheme attracted the researcher’s attention due the reuse of an old social […]

Pierluigi Paganini October 20, 2013
The Hacker Academy on Penetration Testing

Penetration testing is a skill, a profession that requests specific capabilities and the respect of strict rules. Hacking is different from pen testing … Professional hackers are an essential component in today IT landscape, in a previous post I highlighted the great request of the market for so precious figures. Being a hacker is a […]

Pierluigi Paganini October 20, 2013
Syrian Electronic Army attacked most major Qatar websites

Syrian Electronic Army attacked most major Qatar websites to protest against the support of the government to the rebels against Assad. The Syrian Electronic Army (SEA) has hit a new series of targets in a large hacking campaign against high profile Qatar based websites. The Syrian Electronic Army is considered one of the most active and dangerous group of […]

Pierluigi Paganini October 19, 2013
Apple iMessage vulnerable to MITM attack

Quarkslab researchers Cyril Cattiaux has revealed Apple lied when it claimed it could not intercept iMessages sent by its users. Quarkslab researchers Cyril Cattiaux revealed that it is possible to break encryption implemented in Apple’s iMessage application due the presence of a weakness in the key management process. The announcement was made during  the Hack in the Box conference […]