Hacking

Pierluigi Paganini August 13, 2015
Cisco warns hackers are installing malicious ROMMON images on its devices

Cisco is warning enterprise customers about a spike in attacks in which hackers use valid admin credentials on IOS devices to install bogus ROMMON images. Be aware network administrators, Cisco released a new Security Activity Bulletin referring a spike in attacks in which hackers use valid credentials on IOS devices to log in as administrators […]

Pierluigi Paganini August 13, 2015
Yet malicious software found on Lenovo PCs

Chinese computer manufacturers Lenovo has been caught once again using a hidden Windows feature to preinstall unwanted and unremovable rootkit. Lenovo firm was accused several times to supplying equipment for networks of the intelligence and defense services various countries that allowed the Chinese Government to run espionage operations. In 2013, Spy agencies reportedly have a long-standing […]

Pierluigi Paganini August 13, 2015
Hack Satellite Connection and Surf Anonymously with High-speed Internet

A Spanish-based security analyst demonstrated new satellite capturing traps that could allow to surf anonymously with High-speed Internet. Digital signals can be conveyed to certain places by satellites where the Internet appears like a wonder: off-the-network desert sunlight based homesteads, the Arctic or a plane carrying warship adrift. Be that as it may, in radiating […]

Pierluigi Paganini August 12, 2015
Attackers exploit a Windows flaw using a booby-trapped USB

Microsoft announced in the Tuesday’s bulletin that crooks have been exploiting a vulnerability that allows to execute malicious code using booby-trapped USB Microsoft announced in the last Tuesday’s bulletin that crooks have been exploiting a vulnerability that allows to execute malicious code using booby-trapped USB. The vulnerability affects all supported versions of Windows OS as […]

Pierluigi Paganini August 12, 2015
Facebook API flaw Left 1.44 Billion Users’ Identities at risk

A security flaw in the Facebook API allows hackers to decrypt and scan user IDs, nearly 1.44 billion Facebook users are at risk of identity theft. The security researcher Reza Moaiandin, Technical Director at Salt Agency, discovered a flaw in Facebook’s API that can allow hackers to scan for user ID, and that leaves about […]

Pierluigi Paganini August 12, 2015
Darkhotel APT group relied also on Hacking Team’s exploits

Kaspersky revealed provided an update of the report on the Darkhotel APT that targets executives traveling across Asia through hotel internet networks. In November 2014, Kaspersky Lab published a report on the activities of the Darkhotel APT group. Security experts at Kaspersky Lab uncovered the Darkhotel espionage campaign, which is ongoing for at least four years while targeting selected […]

Pierluigi Paganini August 12, 2015
Chinese Hackers still have access to email of Top US Officials

A senior U.S. intelligence official revealed that Chinese hackers have accessed the private emails of “many” top Obama administration officials. According to an official of the US intelligence, Chinese hackers have accessed the private emails of “many” top members of the Obama administration. The news was reported by the NBC News which obtained a top […]

Pierluigi Paganini August 11, 2015
0-Day Deserialization flaw impacts more than 55 percent Android users

Security Experts at IBM have discovered a new critical vulnerability affecting Android OS and impacting more than 55 percent users. There is no peace for the Android users, recently experts discovered the critical Stagefright vulnerability and other serious flaws like the Certifi-gate vulnerability and CVE-2015-3823 flaw. Now experts from IBM have discovered another critical bug in the Google Android OS that impacts more […]

Pierluigi Paganini August 11, 2015
Aerial Assault Drone, the new Hacking Weapon presented at the Defcon

A new hacking machine is available in the arsenal of hackers it is an Aerial Assault drone that is able to automatically crack into wireless networks. David Jordan of US-based Aerial Assault presented was the Def Con conference an assault drone equipped with hacking tools. The vehicle could be used in hacking missions, for example by […]

Pierluigi Paganini August 11, 2015
Internal modem can be exploited by malware to gain persistence

Two security experts at the last Def Con hacking conference have demonstrated how Internal LTE/3G modems can be hacked to help malware survive OS reinstalls Many users totally ignore that LTE/3G modems built into new business laptops and tablets have a dedicated processor and operating system that could be exploited by threat actors to maintain persistent […]