This POC demonstrates that exploiting a Facebook flaw it is possible the disclosure of Friends List EVEN WHEN HE HAS BLOCKED ACCESS TO VIEW IT This is a Proof of Concept made by BHAVESH NAIK DO YOU WISH TO SEE WHO IS IN YOUR FRIENDS LIST, EVEN WHEN YOUR FRIEND HAS BLOCKED ACCESS TO VIEW HIS […]
Is RBN (Russian Business Network) really linked to Facebook Zeus variant? Exclusive interview with WhiteHat who has investigated on the malware. RBN or ordinary crime, Zeus is appearing in new forms and using new infection channels but according some security analysts behind new a variant there could be the support of members of dangerous criminal organization RBN. As […]
The popular security expert Nir Goldshlager found  a serious vulnerability that allows attackers to post spoofed messages from any application on Facebook. Facebook has many vulnerabilities exactly as any other software and daily hackers try to exploit them, the primary concerns of security experts are related to flaws in the popular social network that could all […]
Public offer of Zeus FaaS service on Facebook My readers know very well the dynamic of cybercrime enterprise and in particular of the growing interest in monetization malicious codes such as malware, ransomware and more in general botnets. One of the most targeted sector is banking, the evolution of banking services, their introduction on mobile platforms made attractive targets for cyber criminals, one […]
Last week I attended the third Annual Information Warfare Conference, an interesting opportunity to understand the evolution of cyber warfare scenario specifically for my Italian context. One of the main reflection raised is the limited knowledge on the social-economic impact of the concept of cyber weapon, the majority of governments are currently working to improve […]
The cybercrime represents today one of the primary concerns on global scale, it is a growing industry that is impacting every sector of the society in serious way causing relevant financial loss. The crime is exploring new channels and it is implementing new sophisticated fraud schemas to increase its earnings, daily IT security community registers […]
Trend Micro has released the report “3Q 2012 SECURITY ROUNDUP -Android Under Siege: Popularity Comes at a Price” that presents a worrying trend for malware growth increased of 483%. The increment include cyber espionage malware and also destructive malicious agents targeting mainly the mobile world and in particular Google Android platform. Malware targeting Android platform increased […]
Article Published on The Hacker New Magazine â August Edition âBotnetâ Introduction The nightmare of millions of infected computers synchronized to conduct an attack on specific target finds materialization in the concept of botnet. In the classic architecture each machine, named bot, executes orders sent by a master unit called bootmaster, which can instruct the various […]
Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace The military strategist Carl von Clausewitz stated: âAll war presupposes human weakness and seeks to exploit it.â Malicious software (malware) is software that is explicitly designed to exploit vulnerabilities in computing devices and human users to the malicious advantage of the malware […]
We have discussed several time of the interference of governments inside our ordinary life, they try to control our network, to spy on our social network profiles, to access silently to our gaming console and every thing surround us. The nightmare experienced by the protagonist of the movie “Enemy of the State” is now a […]