Hacking

Pierluigi Paganini October 05, 2016
Animas OneTouch Ping Insulin Pumps could be remotely hacked

Hackers could use Insulin Pumps as weapons, this is not a sci-fi movie, but a disconcerting reality. The OneTouch Ping insulin pumps manufactured by Animas, a company owned by Johnson & Johnson, are affected by multiple several vulnerabilities that can be exploited by remote hackers to harm the diabetic patients who use them. While the security […]

Pierluigi Paganini October 05, 2016
No doubt, events demonstrate that Signal is the most secure messaging app

Why Signal is considered the most secure instant messaging app? It stores only a few information about its users, and the events demonstrate it. Despite many of the most popular apps are implementing end-to-end encryption, not all applications are equal. Security experts recommend Signal for secure communications, in the aftermath of the DNC hack the staffers […]

Pierluigi Paganini October 04, 2016
Download for free 68 Million account details from Dropbox Data Breach

You don’t need to pay in order to receive the full dump from the DropBox data breach, security researcher leaked it online. In August, a data dump containing more than 68 Million account credentials for online cloud storage platform Dropbox was leaked online. Dropbox forced password resets for a number of accounts after discovering the data […]

Pierluigi Paganini October 04, 2016
Peace_of_Mind hacked the hacking forum w0rm_ws and doxed its alleged owner

The notorious hacker Peace_of_Mind has hacked and defaced the official hacking and trading forum w0rm.ws and doxed its alleged owners. ‘Peace_of_Mind‘ (PoM) is a very active actor in The Real Deal Market and The Hell black markets, he offered for sale the dumps from clamorous data breaches, including Yahoo, LinkedIn and MySpace The w0rm.ws a famous hacking platform, it is an ‘invite only’ […]

Pierluigi Paganini October 04, 2016
South Korea ‘s military cyber command was hacked last month

According to the Government of the South Korea, the county military cyber command was hacked last month in the attempt to infect the vaccine routing server. The Government of Seoul revealed that its cyber command center was hacked last month. The South Korean experts have found evidence of the malware in the systems at the cyber command […]

Pierluigi Paganini October 03, 2016
ShadowBrokers complain nobody wants the Euquation Group’s full dump

The ShadowBrokers behind the Equation Group hack is very upset that no one is still bidding on the full dump of the NSA arsenal. Once again we are here to report about the NSA-linked Equation Group and its hacking arsenal leaked online by a group of hackers who called itself TheShadowBrokers. The group of hackers claimed to have […]

Pierluigi Paganini October 03, 2016
The source code of the Mirai IoT botnet leaked online. Do you trust it?

A hacker released the source code of the Mirai malware that powered the record-breaking DDoS attack against the Brian Krebs Website, but … A couple of weeks ago the unknown hackers launched a massive Distributed Denial of Service (DDoS) attack against the website of the popular cyber security investigator Brian Krebs. Further investigation revealed the involvement of […]

Pierluigi Paganini October 03, 2016
UK is going to open the National Cyber Security Centre with 700 experts

The UK Government confirms the opening of the UK first national anti-cybercrime centre, the National Cyber Security Centre (NCSC). UK confirms to be one of the most advanced countries on cyber security and announce the imminent opening of the UK’s first national anti-cybercrime centre, the National Cyber Security Centre (NCSC). The anti-cybercrime centre will open in London […]

Pierluigi Paganini October 02, 2016
A zero day flaw in OpenJPEG JPEG 2000 could lead arbitrary code execution

Cisco Talos Team disclosed a zero-day flaw affecting the JPEG 2000 image file format parser implemented in the OpenJPEG library.  Security experts at Cisco Talos group have discovered a serious vulnerability (TALOS-2016-0193/CVE-2016-8332) affecting the JPEG 2000 image file format parser implemented in OpenJPEG library. An attacker could exploit the flaw to trigger the heap corruption and execute […]

Pierluigi Paganini October 02, 2016
DefecTor – Deanonymizing Tor users with the analysis of DNS traffic from Tor exit relays

Researchers devised two correlation attacks, dubbed DefecTor, to deanonymize Tor users using also data from observation of DNS traffic from Tor exit relays. Law enforcement and intelligence agencies dedicate an important commitment in the fight of illegal activities in the Dark Web where threat actors operate in a condition of pseudo-anonymity. A group of security researchers at […]