Hacking

Pierluigi Paganini March 12, 2016
DARPA Improv program, weaponizing the off-the-shelf electronics

The Defense Advanced Research Projects Agency is launching a new project dubbed Improv that aims to develop new techniques to hack into everyday technology. The IoT paradigm is enlarging as never before our surface of attack, it is obvious that cyber criminals and nation-state hackers are looking at it with an increasing interest. The US Military Defense […]

Pierluigi Paganini March 11, 2016
0-day critical flaws in mobile modems allow hackers to take over your PC

The Russian security tester Timur Yunusov has discovered critical flaw affecting routers and 3G and 4G mobile modems from Huawei, ZTE, Gemtek, and Quanta. The Russian security tester Timur Yunusov has discovered critical vulnerabilities affecting routers and 3G and 4G mobile modems from Huawei, ZTE, Gemtek, and Quanta. The security holes could be exploited by remote attackers […]

Pierluigi Paganini March 11, 2016
How to hack mobile phones embedded fingerprint sensor using 2D Printed fingerprints

Two Computer Science researchers developed a technique to hack a phone’s fingerprint sensor in 15 mins with $500 worth of inkjet printer and conductive ink The Computer Science researchers Kai Cao and Anil K Jain have developed a new technique for hacking a mobile device’s fingerprint sensor in 15 mins with $500 worth of an […]

Pierluigi Paganini March 10, 2016
Tracking users on the Tor Network through mouse movements

A security researcher has devised a new technique to track users by analyzing the mouse movements, even when surfing on the Tor network. While we surf on the Internet we leave an impressive amount of traces that could be used to track our profile and also reveal our identity even we are visiting resources in the darknet. The […]

Pierluigi Paganini March 09, 2016
Bangladesh says hackers stole $100 Million from its US Federal Reserve account

Unknown hackers have stolen more than $100 million from the Bangladesh Bank account at the US Federal Reserve Bank. According to Bloomberg, the Bangladesh’s Finance Minister Abul Maal Abdul Muhith is accusing the U.S. Federal Reserve for the theft of at least $100 million stolen from the Bangladesh’s account. Bangladesh is threatening the US for a legal […]

Pierluigi Paganini March 09, 2016
More than a billion Android devices are easy to hack

A large percentage of Android devices is affected by security vulnerabilities that could be exploited by attackers to easily gain a Root Access. According to experts at TrendMicro a large percentage of Android devices in use today is affected by security vulnerabilities that could be exploited by attackers to easily gain a root access. The attack allows an ill-intentioned […]

Pierluigi Paganini March 09, 2016
How to exploit TFTP protocol to launch powerful DDoS amplification attacks

A group of security researchers from the Edinburgh Napier University elaborated a new DDoS amplification technique relying on the TFTP protocol. A group of security experts from the Edinburgh Napier University (Boris Sieklik, Richard Macfarlane and Prof. William Buchanan) have discovered a new vector for DDoS amplification attacks. Recently the security community has discovered several ways […]

Pierluigi Paganini March 08, 2016
South Korea accused North Korea of hacking key officials’ mobile

The South Korean NIS revealed that North Korea had hacked into smartphones belonging to a number of key government officials. The South Korean National Intelligence Service (NIS) revealed that North Korea had hacked into smartphones belonging to a number of key government officials. The announcement was made on Tuesday, according to the NIS cyber spies from  North […]

Pierluigi Paganini March 07, 2016
Expert discovered how to hack any Facebook account

A security researcher has discovered a Facebook password reset vulnerability that allowed him to brute force into any FB account. The security researcher Anand Prakash has discovered a password reset vulnerability affecting Facebook. The critical vulnerability could be exploited by attackers to hack into any FB account launching a brute force attack. “This post is about a simple vulnerability […]

Pierluigi Paganini March 07, 2016
Coping a 3D Model by recording the sounds of a 3D Printer with a smartphone

The sounds of a 3D printer at work can be analyzed by researchers to reconstruct the original 3D model used to create the object. It isn’t a sci-fi movie but a true experiment conducted by the researchers at the University of California Irvine, led by Mohammad Al Faruque, that demonstrated how to steal 3D-Printed models by copying sounds of […]