Hacking

Pierluigi Paganini August 26, 2015
Sphinx, a new variant of Zeus available for sale in the underground

A new variant of the popular Zeus banking trojan dubbed was Sphinx is appeared for sale on the black market, it operates entirely through the Tor network. A few days ago a new variant of the popular Zeus banking trojan was offered for sale on the black market, its name is Sphinx. Sphinx code is […]

Pierluigi Paganini August 26, 2015
SysAdmin admin tool AutoIt used in targeted attacks to serve malware

Security experts at Cisco have uncovered a targeted attack leveraging on AutoIt to serve a RAT and other malware by evading detection. Security experts at Cisco uncovered a targeted hacking campaign that leveraged AutoIt to spread RAT and other malware via Word documents. The RATs were used to compromise computer of a small number of organizations. “AutoIt […]

Pierluigi Paganini August 25, 2015
The relentless ascent of DDoS attacks

The report Q2 2015 State of the Internet published by Akamai states that there has been a multiplying growth in the quantity of DDoS assaults year over year There has been a multiplying growth in the quantity of DDoS assaults year over year, as per Akamai. Keeping in mind assailants’ planer preferred less capable yet […]

Pierluigi Paganini August 25, 2015
Samsung smart fridge opens Gmail login to hack

At the recent DEF CON hacking conference penetration testers demonstrated that  Samsung smart fridge leaves Gmail logins open to attack. Once again Internet of Things raises security concerns, this time security researchers have discovered a way to steal users’ Gmail credentials from a Samsung smart fridge. At the recent DEF CON hacking conference, they presented a […]

Pierluigi Paganini August 24, 2015
When car hacking has become a scaring reality

Security experts have no doubt about the evolution of the car hacking, we are just at the beginning and we need improve cyber security urgently. The last weeks were very interesting for the security experts interested in the cyber security of modern connected cars. People is even more curious about the car hacking following the […]

Pierluigi Paganini August 24, 2015
Thousands Britons’s hard drives easy to hack with Shodan info

Thousands Britons have been exposed in massive new data hack, their personal and financial data are easy to access online with a simple query on Shodan. Thousands of Britons are exposed to cyber crime after the content of their PC was exposed on the Internet by Shodan, a website dubbed the “Google for hackers.” The leaked […]

Pierluigi Paganini August 24, 2015
Cyber espionage campaign targets India and Tibetan activists

Security experts at FireEye uncovered a cyber espionage campaign that targeted organizations in India and the Tibetan activists. Security firm FireEye revealed an intense activity of hackers based in China particularly interested in entities and organization linked to the Indian Government as well as in information on Tibetan activists. Also in this case we are dealing […]

Pierluigi Paganini August 23, 2015
Security Affairs newsletter Round 23 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Dark marketplaces raked from $300,000 to $500,000 a day How to hack a Parrot drone on the fly How BitTorrent could let lone DDoS attackers bring down big sites […]

Pierluigi Paganini August 23, 2015
Hacking the Iridium network could be very easy

At the last the Chaos Communication Camp, held in Zehdenick, Germany experts demonstrated how to hack the Iridium network and eavesdrop its pager traffic. At the last edition of the Chaos Communication Camp held in Germany the organizers distributed 4500 rad1o badges, powerful devices running a software that could be used to intercept satellite traffic from […]

Pierluigi Paganini August 23, 2015
Who are the Ashley Madison users?

The hackers behind that data breach of the Ashley Madison website have released another dump of 20 GB and experts are publishing their analysis on it. The recent hack of the adultery website Ashley Madison is attracting the attention of the media, after the disclosure of a second dump of data the security experts started their […]