Hacking

Pierluigi Paganini July 16, 2014
SSL Blacklist a new weapon to fight malware and botnet

A Security Researcher at Abuse.ch has started SSL blacklist project to create an archive of all the digital certificates used for illicit activities. In recent years security experts have discovered many cases in which bad actors have abused of digital certificates for illicit activities, from malware distribution to Internet surveillance. Botmasters are exploiting new techniques to avoid detection by security experts and […]

Pierluigi Paganini July 16, 2014
Project Zero – Google is hiring the hacking excellence to improve Internet security

Project Zero is the new initiative announced by Google. The company is hiring the top security experts to make the Internet a more secure place. Google has publicly announced a new program called “Project Zero,” an ambitious project which involves a team of Star Hackers and Bug Hunters with the purpose to improve security of the […]

Pierluigi Paganini July 15, 2014
Kronos, the new banking trojan from Russian underground

Experts at Trusteer have recently discovered an adv on the Russian underground market regarding a new financial Trojan dubbed Kronos. Russian underground is probably the most prolific market for sale of banking malware, malicious code like Citadel, Zeus, Gozi have infected millions computers worldwide dominating the malware threat landscape. The huge demand for banking trojan  is creating the conditions […]

Pierluigi Paganini July 15, 2014
GCHQ JTRIG Tools and Techniques for propaganda and internet deception

Edward Snowden leaked a top-secret GCHQ document which details the operations and the techniques used by JTRIG unit for propaganda and internet deception. The JTRIG unit of the British GCHQ intelligence agency has designed a collection of applications that were used to manipulate for internet deception and surveillance, including the modification of the results of the […]

Pierluigi Paganini July 14, 2014
Chinese Executive charged of hacking on Boeing and other defense contractors

Chinese Executive charged of Hacking on Boeing and other defense contractors to steal military data and advanced technologic projects. According to a US criminal complaint, computers of Boeing and other military contractors have been hacked to steal intellectual property and trade secrets on transport aircraft. The initial attacks against Boeing probably occurred between Jan 14th and […]

Pierluigi Paganini July 13, 2014
Pitty Tiger – small ATPs scare private companies

Security researchers at AIRBUS have uncovered a new APT, named Pitty Tiger, involved in a cyber espionage campaign which targeted mainly private companies. Security experts at AIRBUS Defence & Space – CyberSecurity unit have recently disclosed the results of their investigation on a new APT dubbed Pitty Tiger involved in a cyber espionage campaign which targeted mainly private companies. Also in […]

Pierluigi Paganini July 12, 2014
Gmail App for iOS vulnerable to Man-in-the-Middle Attacks

Security experts at Lacoon discovered a vulnerability in the Gmail iOS app which enables a bad actor to perform a Man-in-the-Middle. Google Gmail application for iOS is exposed to risks of  Man-in-the-Middle (MitM) attacks which allow bad actors to monitor encrypted email communications. An expert at mobile security firm Lacoon has discovered that version of Gmail […]

Pierluigi Paganini July 11, 2014
Chinese hackers violated systems at the Office of Personnel Management

The New York Times revealed that in March Chinese hackers hacked systems at Office of Personnel Management stealing files of thousands of  Federal employees According to the New York Times, senior American officials revealed that a group of Chinese hackers violated the computer networks of the United States government agency in March. The Chinese bad actors hacked US government systems […]

Pierluigi Paganini July 10, 2014
The Internet of Things and Cybercrime – what risks?

Analysis of the compliance measures to be put in place in order to face data protection issues affecting the Internet of Things. The Internet of Things is expected to lead to 50 billion connected devices by 2020 collecting and exchanging personal data about their users, their lives, their preferences and tastes.  This will lead not […]

Pierluigi Paganini July 09, 2014
Hacking LIFX Smart LED Light bulbs to steal WiFi Passwords

Context Information Security firm has discovered a security vulnerability in LIFX smart LED light bulbs that can be remotely controlled by mobile devices. Researchers at Context Information Security have discovered a security flaw in a WiFi enabled, smart LED light LIFX bulb that can be remotely controlled via mobile devices. The discovery was the result of a […]