Hacking

Pierluigi Paganini December 13, 2016
Adobe patches multiple flaws including a Flash Zero-Day exploited in the wild

Adobe issued security patches that address multiple flaws in 9 products, including fixes for zero-day vulnerabilities that has been exploited in the wild. Adobe has issued security updates to fix vulnerabilities in nine products, including patches for zero-day flaws that has been exploited in targeted attacks. The version 24.0.0.186 of Flash Player addresses 17 vulnerabilities, some of them can […]

Pierluigi Paganini December 13, 2016
Hacking McAfee VirusScan Enterprise for Linux, upgrade it asap

Intel Security McAfee VirusScan Enterprise for Linux is affected by ten vulnerabilities that can be chained for remote code execution with root privileges. The security expert Andrew Fasano discovered multiple vulnerabilities in the Intel Security’s McAfee VirusScan Enterprise solution for Linux, one of them can be chained by attackers to gain root privileges and remote execute code. Mr. […]

Pierluigi Paganini December 13, 2016
Kapustkiy hacked the Consular Department of the Embassy of the Russian Federation

Kapustkiy breached website for the Consular Department of the Embassy of the Russian Federation in the Netherlands and accessed passport numbers and PPI. The white hat hacker Kapustkiy breached the website for the Consular Department of the Embassy of the Russian Federation in the Netherlands (ambru.nl). The hacker broke into the database and accessed personal information of […]

Pierluigi Paganini December 13, 2016
Some versions of Netgear routers remain vulnerable to arbitrary command injection

A security flaw was discovered in some NetGear routers that could be easily exploited by a remote attacker to gain root access on the device and remotely run code. Some versions of Netgear routers remain affected by a security flaw that could be exploited by hackers to gain root access on the device and remotely […]

Pierluigi Paganini December 12, 2016
Ransomware infections suffered by companies tripled in 12 months

According to a new report published by Kaspersky Lab, the number of ransomware infections suffered by companies threefold from January to September. The number of ransomware infections suffered by companies continues to increase and according to a new report published by the security firm Kaspersky Lab, it increased threefold from January to September. One in every five businesses […]

Pierluigi Paganini December 12, 2016
Tor Project released an alpha version of the Sandboxed Tor Browser

Experts from the Tor project have launched an early alpha version of Sandboxed Tor Browser 0.0.2. to protect users’ anonymity. Experts from the Tor project have launched an early alpha version of Sandboxed Tor Browser 0.0.2. The Sandboxed Tor Browser aims to isolate the Tor Browser from other processes of the operating system in order to limit its ability […]

Pierluigi Paganini December 12, 2016
Zcash cryptocurrency, a new opportunity for cyber criminals

Zcash (ZEC) is a new cryptocurrency that promises a total anonymity, it is already attracting a great interest from miners and of course cybercriminals. Zcash (ZEC) is the cryptocurrency of the moment, it was presented on October, 2016 and respect the popular Bitcoin it is totally anonymous. With this premise, the Zcash has attracted a great […]

Pierluigi Paganini December 12, 2016
Critical flaw in PricewaterhouseCoopers SAP security tool, but PwC tries downplay it

A PricewaterhouseCoopers SAP software, the Automated Controls Evaluator (ACE), is affected by a critical security flaw that could be exploited by hackers. A software developed by PricewaterhouseCoopers for SAP systems, the Automated Controls Evaluator (ACE), is affected by a critical security flaw. The vulnerability was discovered by the security firm ESNC who analyzed the tool. The Automated Controls […]

Pierluigi Paganini December 12, 2016
How much cost a StingRay? Surveillance is a profitable business

Motherboard published an interesting blog post which includes further details on the cost of StingRay phone surveillance equipment. A couple of years ago I published a post on Stingray Technology trying to explain how governments track cellular devices. A StingRay is an IMSI-catcher (International Mobile Subscriber Identity) designed and commercialized by the Harris Corporation. At the time of the […]

Pierluigi Paganini December 11, 2016
UK National Security Strategy, Cyber Security is a top priority

The UK Government published the first annual report on the implementation of the 2015 National Security Strategy. The strategy considers cyber security a top priority alongside the resurgence of state-based threats (Russia’s actions in Syria and Ukraine) and the terrorism (extremism and instability). When dealing with the impact of technology, especially cyber threats the report […]