Hacking

Pierluigi Paganini November 08, 2016
Abusing protocols in LTE networks to knock mobile devices off networks

A group of researchers from Nokia Bell Labs and Aalto University in Finland demonstrated how to hack protocols used in the LTE networks. We discussed several times the rule of the SS7 signaling protocol in mobile communications and how to exploit its flaws to track users. When mobile users travel between countries, their mobile devices connect to the infrastructure of a […]

Pierluigi Paganini November 08, 2016
WikiLeaks published DNCLeak2, but someone DDoSed it

WikiLeaks confirmed that the email publication server suffered a massive DDoS attack since it published a new set of DNC hacked emails dubbed as DNCLeak2. A couple of days before the 2016 Presidential election, WikiLeaks has published a new set of emails hacked from the Democratic National Committee (DNC). The new set, dubbed DNCLeak2, includes 8,200 emails, the […]

Pierluigi Paganini November 07, 2016
Tesco Bank suspended all online transactions due to a cyber heist

Tesco Bank halted all online transactions after a cyber heist affected thousands of its customers. An investigation is ongoing. Tesco Bank is going to adopt a strong measure in response to a cyber attack, the financial institution will freeze customers’ online transactions. The measure was announced by the chief executive Benny Higgins, the bank has admitted […]

Pierluigi Paganini November 07, 2016
Bypassing Two-Factor Authentication on Outlook Web Access

Enterprises running Exchange Server using two-factor authentication on Outlook Web Access (OWA) could be hacked due to a design flaw. New troubles for enterprises running Exchange Server, two-factor authentication implementations on Outlook Web Access (OWA) could be easily bypassed due to a design flaw. An attacker can bypass two-factor authentication to access email inboxes, calendars, contacts and […]

Pierluigi Paganini November 06, 2016
Databases of Indian embassies leaked online. Too easy hack them

The databases of the Indian Embassies in Switzerland, Mali, Romania, Italy, Malawi, and Libya were leaked online by two grey hat hackers. Today I was contacted by a security pentester who goes online with the moniker Kapustkiy who revealed me to have breached the Indian Embassies in Switzerland, Mali, Romania, Italy, Malawi, and Libya. Kapustkiy and his friend Kasimierz (@Kasimierz_) told […]

Pierluigi Paganini November 06, 2016
How to Exploit Belkin WEMO gear to hack Android devices

Belkin’s WeMo home automation firmware that’s in use in several IoT devices has recently been found vulnerable to an SQL injection. Belkin’s WeMo home automation firmware that’s in use in its light bulbs, switches, security cameras, coffee makers and room heaters has recently been found vulnerable to an SQL injection. The hack allows root privileges […]

Pierluigi Paganini November 06, 2016
Commercial Exaspy spyware used to target high-level executives

Security researchers at Skycure have discovered a new commodity Android Spyware, dubbed Exaspy, targeting high-level executives. While in many countries the number of Smartphone and Tables is greater of desktop PC, new threats are targeting mobile devices. Researchers at Skycure have discovered a new strain of Android spyware, dubbed Exaspy, that has been used in targeted attacks against […]

Pierluigi Paganini November 05, 2016
The US Government is ready to hack back if Russia tries to hit Presidential Election

Documents and testimonials collected by the NBC news confirm US Government cyber army is ready to hack back if Russia tries to disrupt Presidential Election The alleged interference of Russian state-sponsored hackers into the 2016 Presidential election is triggering the response of the US. For the first time, a member of the US Presidential Staff has treated another country […]

Pierluigi Paganini November 05, 2016
One oAuth 2.0 hack, 1 Billion Android App Accounts potentially exposed

Security researchers demonstrated that a Wrong oAuth 2.0 implementation allows a remote simple hack that exposes more than 1 Billion Android App Accounts. A remote simple hack devised by a group of security researchers threatens an amazing number of Android and iOS apps. An attacker can use the technique to sign into any victim’s mobile […]

Pierluigi Paganini November 05, 2016
How to compromise PLC systems via stealthy Pin control attacks

At the Black Hat Europe 2016 two security researchers devised undetectable attacks that could be used to hack PLC systems avoid being detected. Security researchers at the Black Hat Europe 2016 have presented a new attack method that could be used to hack programmable logic controllers avoid being detected. programmable logic controllers are essential components for […]