Hacking

Pierluigi Paganini January 12, 2016
A research team has found two flaws in the OAuth 2.0 protocol

According to a group of researchers from the University of Trier two critical flaw affects the oAuth 2.0 authentication protocol. The OAuth 2.0 authentication protocol is widely used on social networking sites, every day billion of users access their profiles on Facebook and Google+ using it. According to researchers Daniel Fett, Ralf KĂŒsters and Guido […]

Pierluigi Paganini January 12, 2016
A XSS may have exposed users of the eBay website to phishing attacks

A security researchers reported a Cross-Site Scripting (XSS) vulnerability that may have exposed users of the eBay website to phishing attacks. An independent security researcher, using the nickname MLT, reported last month a simple flaw affecting the eBay website exposed its customers to phishing attacks. An attacker can exploit the vulnerability to host a bogus phishing page on the eBay website attempting […]

Pierluigi Paganini January 12, 2016
Google hacker criticized TrendMicro for critical flaws

A hacker with Google Project Zero research team, publicly disclosed critical vulnerabilities in the TrendMicro Antivirus. Tavis Ormandy, a researcher with Google’s Project Zero vulnerability research team, publicly disclosed critical vulnerabilities in TrendMicro Antivirus that could be exploited to execute malicious code on the targeted system. Ormandy took only about 30 seconds to find the […]

Pierluigi Paganini January 11, 2016
Watchout Smart TV Malware is Here

Security experts at Kaspersky Lab investigated a threat to discover it was specifically designed to compromise Smart Tv devices or it was an accidental infection. A Reddit user with username being “moeburn” raised the likelihood of new malware flowing for Smart TVs, this week: My sister got a virus on her TV. A VIRUS ON […]

Pierluigi Paganini January 10, 2016
Why PS4 is not so secure for the ISIS members’ communication?

Duo Labs demonstrated that there’s no reason to think that PS4 or Xbox are any more secure than anything else when dealing secret communication. Members of the ISIS terrorist group make large use of technology, security experts believe that it is radical organization with the greatest cyber capabilities in the history. Recently a footage published […]

Pierluigi Paganini January 10, 2016
The FBI used the NIT to de-anonymize thousand Pedos on Tor

The US law enforcement conducted an unprecedented hacking campaign leveraging on the  network investigative technique (NIT) to de-anonymize Tor users. In July, at least two individuals from New York have been charged with online child pornography crimes after visiting a hidden service on the Tor network. The Federal Bureau of Investigation (FBI) had used a hacking […]

Pierluigi Paganini January 09, 2016
Islamic State launches the Kybernetiq magazine for cyber jihadists

The Islamic State launches a new cyber war magazine for jihadists titled Kybernetiq that instructs militants about technology. The ISIS continues to demonstrate great communication capabilities, the dreaded radical organisation not only master social media for its propaganda, but now has launched a magazine titled Kybernetiq. The magazine aims to instruct jihadist on how to participate in the cyber war against the […]

Pierluigi Paganini January 09, 2016
DDoS attack on BBC may have reached 602Gbps, never so powerful

The  hacking group New World Hacking that claimed the responsibility for the BBC attack revealed that the DDoS attack reached the 602 GBps. On December 31th, the BBC website and iPlayer service went down due to a major “distributed denial of service” attack.” The attack started at 0700 GMT and paralyzed the websites for more than […]

Pierluigi Paganini January 08, 2016
Experts revealed that security camera vendors lack of security by design

When it comes to securing homes and businesses, a security camera is a privileged solution but it paradoxical is exposing users to further risks. A new study made by researchers from NowSecure shows that IoT vendors have yet a lot to learn in terms of security, often doing many mistakes in that area. In the […]

Pierluigi Paganini January 07, 2016
Resume files locked by Linux Encoder with Bitdefender decryption tool

Bitdefender has discovered for the third time a flaw in Linux Encryption Ransomware Linux Encoder that exposes the decryption Key used to lock the files. In November  2015, the Russian antivirus firm Doctor Web reported the discovery of a new Linux ransomware dubbed Linux Encoder that was specifically designed to infect Linux systems. The Linux.Encoder1 ransomware encrypts files present […]