Hacking

Pierluigi Paganini November 30, 2015
Italian intelligence plans to monitor also communications through the Playstation

Italian intelligence is planning to invest in solutions that could allow its counter-terrorism agents to monitor Sony’s PlayStation Network. The Italian intelligence is planning to invest in solutions that could allow the agents of the Italian counter-terrorism to monitor Sony’s PlayStation Network in order to prevent any abuse of jihadists. A few hours later the Paris attacks, […]

Pierluigi Paganini November 30, 2015
The Hello Barbie doll, lights and shadows

Mattel’s Hello Barbie has finally arrived in stores, but security experts have raised questions about security and privacy issues related to the technological toy. Are you thinking of buying a Barbie for your daughter this Christmas? Mattel’s Hello Barbie has finally arrived in stores, but security experts have raised questions about security and privacy issues […]

Pierluigi Paganini November 30, 2015
Turris Omnia Security Project protects home network users

The non-profit security research Turris Omnia project originating from the Czech Republic focuses on safety of SoHo users. The non-profit security research project originating from the Czech Republic, which focuses on safety of SoHo users, has recently entered a new phase. This project, whose users include such celebrities as Vint Cerf and Steve Crocker, is the work […]

Pierluigi Paganini November 27, 2015
VPN users be aware , Port Fail flaw can reveal your identity

Security experts at the VPN provider Perfect Privacy discovered a new vulnerability dubbed Port Fail that could be exploited to de-anonymize VPN users. Security experts at the VPN provider Perfect Privacy discovered a new vulnerability dubbed Port Fail which affect all VPN (Virtual Private Network) protocols and operating systems. An attacker can exploit the Port Fail flaw […]

Pierluigi Paganini November 27, 2015
Nest camera, has a different definition for Turn off Mode

Findings of a research show that the Nest camera is still operating even after it has been disabled through the mobile application. People buy security cameras to have a higher level of control over their lives, but recently a research by a team at ABI Research found that users also must be worried about the […]

Pierluigi Paganini November 26, 2015
Windows Phone hacked with Windows Phone Internals

Windows Phone Internals allows to unlock bootloader, enable Root access and create Custom ROM’s on selected Windows Lumia mobile devices. We have spoken several times about jailbreaking and rooting activities explaining that these procedures allow to remove hardware restrictions implemented by the Apple and Google operating systems to give users root access allowing to download and install applications […]

Pierluigi Paganini November 26, 2015
FBI is hunting MrGrey who has stolen 1.2 BILLION login credentials

The FBI is convinced that there is a single hacker behind the theft of login credentials for over 1.2 Billion online accounts, his name is MrGrey. According to a report published by the Reuters, the FBI is convinced that there is a single hacker behind the theft of login credentials for over 1.2 Billion online accounts, his […]

Pierluigi Paganini November 26, 2015
IoT devices are re-using cryptographic keys, leaving in danger millions of devices

Researchers from SEC consult analyzed more than 4000 firmware’s embedded devices, where is included devices belonging to 70 vendors. The findings are astonishing! Researchers from SEC consult analyzed more than 4000 firmware’s embedded devices, where is included devices belonging to 70 vendors. The categories of devices analyzed include Internet gateways, routers, modems, IP cameras, VoIP […]

Pierluigi Paganini November 26, 2015
Facebook first discovered spear phishing attacks of Iranian hackers on State Department employees

Facebook was the first company to notice the intrusion of Iranian Hackers in the e-mail accounts of US State Department officials focused on Iran. The attacks appear politically motivated and aimed to gather data about US-Iranian dual citizens in Iran. Earlier this month, the computers at the US State Department and other government employees were targeted by hackers. […]

Pierluigi Paganini November 25, 2015
How The Russian Abused Twitter as C&C in Hammertoss Malware? Python Answers

Today, we will replicate a technique which has been used by recent, sophisticated and hard to trace a Russian malware called Hammertoss. Today, we will replicate a technique which has been used by recent, sophisticated and hard to trace a Russian malware called Hammertoss, the creators of this malware has abused multiple well-known sites like Twitter […]