Breaking News

Pierluigi Paganini August 09, 2016
Automated systems crawl the DarkWeb to find Zero-Days

A team researchers at Arizona State University (ASU) is crawling the Darkweb searching for zero-days for Proactive Cybersecurity Threat Intelligence Can finding zero-day vulnerabilities be as easy as crawling the Darkweb? Security researchers at Arizona State University (ASU) think so and they’re already seeing some success.  In a paper titled, “Darknet and Deepnet Mining for […]

Pierluigi Paganini August 09, 2016
900M+ Android users exposed to hack due to Qualcomm Quadrooter flaws

Experts from Checkpoint have found four major vulnerabilities dubbed Quadrooter in Qualcomm chips that expose more than 900M Android users to hack. Security experts from the security firm Checkpoint have found four major vulnerabilities, dubbed Quadrooter, in the firmware running on the in the Qualcomm chips that equip modern Android devices. The Quadrooter flaws could be […]

Pierluigi Paganini August 09, 2016
Oracle MICROS payment terminal biz hacked. Payments worldwide at risk

The systems of the Oracle MICROS payment terminals division have been infected by a malware, systems worldwide are potentially at risk. The hack that I’m going to tell you could have a serious and a huge impact, the systems of the Oracle MICROS payment terminals division have been infected. MICROS is among the top three […]

Pierluigi Paganini August 09, 2016
Hacker Interviews – The Phantom Squad

Today I have interviewed The Phantom Squad, one of the most dreaded groups of hackers on the Internet. Enjoy the Interview. You are a talented hacker that has already participated in several hacking campaigns, could you tell me more about. We started in November 2015. We have taken down PSN and have also targeted other […]

Pierluigi Paganini August 08, 2016
ProjectSauron APT, aka Strider, found targeting firms in Russia, China

Experts spotted a previously unknown APT group dubbed Strider or ProjectSauron that carried out surgical cyber-espionage attacks against targets worldwide. A previously unknown hacking group variously dubbed ‘Strider’ or ‘ProjectSauron’ has been conducting a surgical cyber espionage campaign against targets in Russia, Belgium, China, Iran, Sweden, and Rwanda. According to experts from Symantec, the Strider crew […]

Pierluigi Paganini August 08, 2016
Nuuo and Netgear video surveillance recorders affected by multiple flaws

The US-CERT warns of the presence of multiple flaws in the Nuuo NVRmini and other network video recorders of the same vendor. The US-CERT has issued a security advisory related to the presence of multiple vulnerabilities in the Web interface of a Netgear ReadyNAS Surveillance video recorder  and various devices manufactured by the video recording company […]

Pierluigi Paganini August 08, 2016
Garda forced to shut down its systems after a malware-based attack

The experts from the Irish Garda are investigating a malware-based attack that forced it to shut down its data systems. No system was breached. The Garda Síochána, the national police service of Ireland, was forced to shut down its data systems in response to a malware-based attack. The Ireland’s national police put in place the emergency […]

Pierluigi Paganini August 08, 2016
Hackers could break into billion computers through their monitor

At the DEF CON conference, a group of three researchers from Red Balloon Security has demonstrated how to hack a computer through its monitor. It is a common error consider monitors as a passive device that could not be exploited by attackers to hack our systems. The reality is quite different, attackers could hijack every monitor […]

Pierluigi Paganini August 08, 2016
A New Google API Launched, in Avoidance of Android Passwords

Google has launched a new Google API working together with Dashlane, to stop using passwords for Android users and improving the user experience. It is true that Android security apps work wonder and also Google has been trying to use fewer passwords or none whatsoever, making it harder for someone to penetrate the privacy of its users. […]

Pierluigi Paganini August 07, 2016
A flaw in Samsung Pay could be exploited to remotely skim credit cards

The security expert Salvador Mendoza demonstrated that is it easy to steal Samsung Pay tokens and reuse them to make fraudulent purchases. The security researcher Salvador Mendoza has discovered a flaw in the Samsung Pay system that could be exploited by hackers to remotely skim credit cards. The attackers can steal Samsung Pay tokens and […]