security

Pierluigi Paganini August 27, 2013
China hit by DDoS attack. The Internet inaccessible for hours

China hit by DDoS attack. The CINIC confirmed that the country suffered a DDoS attack over the weekend causing the Internet inaccessibility for hours. During the weekend China’s Internet was taken down by a powerful DDoS attack, according to security experts behind the offensive there is a group of skilled hackers that on Sunday hit the […]

Pierluigi Paganini August 24, 2013
Critical Pinterest Exploit threatens the privacy of millions of users

Security researcher Dan Melamed has found a serious Pinterest Exploit that exposed user’s information of over 70 Million accounts. The security researcher Dan Melamed has found a Critical Pinterest Exploit that compromised the privacy of over 70 Million Users, the flaw allows hackers to view the email address of any user on Pinterest. Pinterest is a very popular […]

Pierluigi Paganini August 19, 2013
Short Password Reset code vulnerability allows hackers to brute-force many websites

Indian hacker reported a Short Password Reset code vulnerability that could allow attackers to brute-force many high profile websites not protected by CAPTCHA verification system. Yesterday we received a vulnerability report in web applications from some unknown Indian Hacker who explained that how Hackers are hijacking Mobile recharge and Free SMS service related websites. He […]

Pierluigi Paganini August 18, 2013
USB Internet Modems vulnerability exposes Millions of PCs

The Indian security expert ‘Rahul Sasi’ found a USB Internet Modems vulnerability that could allow to gain Meterpreter shell or  full access to the victim just sending an SMS. The Indian Security expert ‘Rahul Sasi‘ announced to have found a USB Internet Modems vulnerability that could allow an attacker to execute malicious code remotely simply sending an SMS […]

Pierluigi Paganini August 18, 2013
The Hackers Conference 2013 – Hackers will Demonstrate Digital Dangers

This is the second edition of ‘The Hackers Conference’. Following the huge success of the conference last year the current edition of the conference brings back to you all the knowledge, all the fun in a better, grander way! The Conference will be held in New Delhi, on the 25 of August 2013, and will […]

Pierluigi Paganini August 11, 2013
DNS impairment redirects thousands of websites to malware

Cybercriminals are exploiting the possibility of DNS impairment to redirects visitors of thousands legitimate websites to compromised domains used to serve malware. DNS impairment or rather compromising DNS to distribute malicious code, cyber criminals are very attracted by the possibility to use DNS servers to redirect users that trying to visit a legitimate domain are hijacked […]

Pierluigi Paganini July 27, 2013
GPS vulnerability exploitable to control the route of a vessel

A GPS vulnerability could allow hackers and terrorists to hijack ships, drones and commercial airliners, the GPS expert Todd Humphreys demonstrated it. A GPS vulnerability could allow hackers and terrorists to hijack ships, drones and commercial airliners, the news represents a motivation of the greatest concerns for responsible for the national security of every country. […]

Pierluigi Paganini July 07, 2013
Avira.com SQL Injection and Security Filter Bypassing

Cyber Security Analyst Ebrahim Hegazy has found an Avira.com SQL Injection vulnerability, Avira.com is the famous Avira Antivirus vendor’s web site. Ebrahim Hegazy(@Zigoo0) Cyber Security Analyst Consultant @ Q-CERT who found a SQL Injection in Yahoo! about two months ago, has found a new SQL Injection vulnerability in Avira.com the famous Avira Antivirus vendor. The […]

Pierluigi Paganini July 06, 2013
DropBox account hacking bypassing two-factor authentication

Zouheir Abdallah revealed that a hacker already knows the victim’s credentials for Dropbox account that has 2FA authentication enabled, is able to hack it. Few hours ago I was informed that Q-CERT team found a critical vulnerability in DropBox that allows a hacker to bypass the two-factor authentication implemented by the popular file sharing service. […]

Pierluigi Paganini July 05, 2013
Android vulnerability makes 99% of mobile devices attackable

Bluebox Labs recently discovered an Android vulnerability in the OS’s security model that allows hackers to attack 99% of Android devices on the market. Android vulnerability allows app modification preserving signatures … this is the shocking discovery announced by Bluebox Labs. During this week we have had the opportunity to discuss about mobile botnets and […]