Security Affairs

Pierluigi Paganini November 13, 2015
Central Shop, the evolution of credit card black markets

Central Shop is a web portal dedicated to the sale of stolen credit card data that captures the attention of the experts due to its amazing interface. The sale of stolen credit card data is one of the most prolific activities in the criminal ecosystem, in many black markets it is quite easy to acquire the precious commodities. Today […]

Pierluigi Paganini November 11, 2015
Drone regulation – Keeping the skies safe from commercial drones

My participation at the World Insight on CCTV discussing the Federal Aviation Administration regulation for the commercial  drones. Q1 First of all, the Federal Aviation Administration gave a very compressed timeline. They’re asking a expert panel task force to make registration guideline recommendations by November 20 and these recommendations implemented by mid-December, so that 1 […]

Pierluigi Paganini November 10, 2015
New insight on the Rocket Kitten Iranian hacking crew

Experts from Check Point firm published a new report on the Rocket Kitten APT that include more insight into the activities of the group. Do you remember the Rocket Kitten ATP? The Rocket Kitten group has been suspected to be active since 2011 and have been increasing their activity since 2014. The main targets are based in the Middle […]

Pierluigi Paganini November 08, 2015
The Infernal-Twin tool, easy hacking wireless networks

The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to automate the Evil Twin Attack. The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to assess wireless security by automating the Evil Twin Attack. “The tool was created to help the auditors and penetration testers […]

Pierluigi Paganini November 08, 2015
Security Affairs newsletter Round 34 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Hackers have accessed details of 1,827 Vodafone customers How to steal Jaguar XFR cars in 60 seconds by hacking them Allegations of ISIS involvement in Flight 7K9268 crash not […]

Pierluigi Paganini November 04, 2015
CryptoWall 4.0 Released with a New Look and Several New Features

The fourth member of the CryptoWall family of ransomware, CryptoWall 4.0, has just been released, complete with new features and a brand new look. We recently reported that CryptoWall 3.0 has allegedly caused over $325 million in annual damages. CryptoWall first emerged in April 2014. Its first major upgrade was dubbed CryptoWall 2.0, and first emerged in October […]

Pierluigi Paganini November 03, 2015
Chimera, a new strain of ransomware in the wild

According to a German website, there is a new strain of ransomware dubbed Chimera that also threatens to publish personal data on the Internet. A new strain of ransomware is targeting German companies, it is named Chimera and this time crooks don’t limit their extortion scheme to the file encrypting, they are also threatening victims […]

Pierluigi Paganini November 01, 2015
Security Affairs newsletter Round 33 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Germany probes alleged new case of US espionage: Regin malware infected Gov laptop Alleged LulzSec member claims responsibility for the DDoS on TalkTalk This 11-year-old is selling cryptographically secure […]

Pierluigi Paganini October 28, 2015
The US DoD still uses SHA-1 signed certificates for use by military agencies

The United States Department of Defense is still issuing SHA-1 signed certificates for its military agencies, despite they are considered insecure. Today I have published a blog post on the Army Vulnerability Response Program (AVRP), a sort of bug bounty program specific for the US military environment. The idea is to incentive  the ethical disclosure of vulnerabilities […]

Pierluigi Paganini October 28, 2015
US Army Experts Call for military bug bounty program AVRP

US Army Military experts urge the establishment of an Army Vulnerability Response Program (AVRP),  a sort of military bug bounty program. What happen when bug hunters have to work with high sensitive environment? An interesting post published by the Cyber Defense Review raises the discussion about the was way to handle vulnerabilities in the information security infrastructure of the […]