Security Affairs

Pierluigi Paganini March 20, 2016
Redaction error reveals Feds ordered Lavabit to spy on Snowden

A redaction error in court-ordered release of the Lavabit case files confirmed that Edward Snowden was the target of the FBI. Lavabit was an encrypted webmail service founded in 2004 by Ladar Levison, it closed on August 8, 2013 after the US authorities ordered it to turn over its Secure Sockets Layer (SSL) private keys to order government surveillance activities. […]

Pierluigi Paganini March 18, 2016
New Android Gmobi adware found in firmware and popular apps

Malware researchers at the Dr Web firm have found an Android malware named Gmobi specifically designed to spread as a software development kit (SDK). Malware researchers at security firm Dr.Web have detected a new strain of malware that was specifically designed to spread as a software development kit (SDK) used by  software developers and mobile device […]

Pierluigi Paganini March 12, 2016
Typos stopped hackers stealing $1bn from Federal Reserve Bangladesh account

Hackers who allegedly infiltrated the Federal Reserve Bangladesh’s account were attempting to steal almost $1 billion, but typos thwarted the plan. This week the principal news agencies shared the news of the hack of the Bangladesh account at the Federal Reserve Bank of New York. The Bangladesh’s Finance Minister Abul Maal Abdul Muhith accused the U.S. Federal […]

Pierluigi Paganini March 07, 2016
Which are principal cybercriminal ecosystems in the Deep Web?

TrendMicro published an interesting analysis of the principal cyber criminal underground communities in the Deep Web worldwide. A new interesting report published by the experts at TrendMicro highlights the differences between the principal underground ecosystems worldwide. Thinking of a unique “global” underground ecosystem is an error, every community has its own characteristics, the criminal crews that […]

Pierluigi Paganini March 03, 2016
US starts cyber operations against the ISIL in Mosul

Senior Pentagon officials on Monday revealed the military’s first use of cyber warfare operations against the ISIL terrorist group. The US military has started launching cyber attacks against members of the terrorist organization ISIS as part of the operation conducted to take back the Iraqi city of Mosul. The US military is using cyber tools to […]

Pierluigi Paganini February 29, 2016
Using the Microsoft EMET security tool to hack itself

The security researchers at FireEye Abdulellah Alsaheel and Raghav Pande have found a way to exploit Microsoft EMET (Enhanced Mitigation Experience Toolkit) to hack itself. The security researchers at FireEye security Abdulellah Alsaheel and Raghav Pande have found a way to exploit the Microsoft security tool Enhanced Mitigation Experience Toolkit to hack itself. The Enhanced Mitigation […]

Pierluigi Paganini February 28, 2016
A DHS report confirms the use of BlackEnergy in the Ukrainian outage, still unknown its role

A report issued by the DHS CERT confirms that the outage in Ukraine was caused by a well-coordinated attack still unclear the BlackEnergy role. In December, a major outage hit a region in Ukraine, more than 225,000 customers were affected by the interruption of the electricity. Security experts speculate the involvement of Russian nation-state actors that have used the BlackEnergy to […]

Pierluigi Paganini February 28, 2016
Security Affairs newsletter Round 49 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs Project Cumulus – Tracking fake phished credentials leaked to Dark Web Linux Mint was hacked, website served malicious ISO on Saturday Utah systems experiences 300k hacking attacks a day due to the presence of the NSA Data […]

Pierluigi Paganini February 24, 2016
Mousejack attack – Hijack Wireless Mouse/Keyboard Dongles from 100 meters to control PCs

Mousejack attack – Researchers at Bastille firm demonstrated how to hack computers by exploiting a flaw in many wireless mouse and keyboard dongles. A bogus wireless computer mice and keyboards can be used by threat actors to compromise laptops from up to 100 metres away. The experts demonstrated that the attack, called mousejack attack, is […]

Pierluigi Paganini February 21, 2016
Security Affairs newsletter Round 48 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs Stolen card data of 100,000 Britons for sale on the clear web Iranian hackers compromised former IDF chiefs computer Security Affairs newsletter Round 47 – News of the week Man charged of Laundering $19.6 Million earned with […]