Security

Pierluigi Paganini May 12, 2016
Flawed 7-Zip compression tool opens systems to hack.Update it now!

Recently security experts at Cisco Talos have discovered multiple exploitable vulnerabilities in 7-Zip that open users to cyber attacks. According to the Cisco security researcher Jaeson Schultz, multiple flaws in the 7-Zip compression tool could be exploited by hackers to gain the complete control on the target machine running the popular software. “Recently Cisco Talos has […]

Pierluigi Paganini May 12, 2016
Covert Communication Techniques Used By Next Gen High Tech Terrorists

With the advent of technology, terrorists have changed their strategies and converted themselves into high-tech & sophisticated groups. “While Osama Bin Laden had his fingers on the trigger, his children have their fingers on the mouse.” Intro Until now people have fought for food, water or territory, but today the definition and motivation of fighting […]

Pierluigi Paganini May 11, 2016
Facebook Capture The Flag is now open source. Learn to hack!

Facebook hopes to make security education easier for students with the release of its Capture the Flag platform to open source on GitHub! Are you interested in testing your hacking abilities? Facebook is offering a secure opportunity for you by opening it Capture The Flag (CTF) platform to test hacking skills in a legally safe environment […]

Pierluigi Paganini May 09, 2016
The hidden information behind 12,000 PoC Exploits shared online

A study conducted by Recorded Future on PoC exploits shared online over the last year shows that social media is the main distribution channel. Security experts at the threat intelligence firm Recorded Future have conducted an interesting study on the proof-of-concept exploits shared online (e.g. On Twitter, on forum linking to personal blogs, GitHub, or Pastebin) last year. […]

Pierluigi Paganini May 09, 2016
Hackers can break into a facility by spending $700 on Amazon or eBay

Hackers demonstrated to the Tech Insider how to break into any office by purchasing from Amazon and eBay $700 worth of electronic parts to clone access cards. Breaking into a company could be very easy and cheap for hackers, it could be sufficient to buy from Amazon and eBay $700 worth of parts. “We watched a […]

Pierluigi Paganini May 07, 2016
Lenovo fixes serious flaw in pre-installed Lenovo Solution Center

Lenovo fixed the Lenovo Solution Center, once again the company faces problems with pre-installed bloatware causing major security problems for users. Lenovo has fixed a security vulnerability in the Lenovo Solution Center (LSC) support tool that could be exploited by attackers to execute code with system privileges and take over the machine. Lenovo Solution Center […]

Pierluigi Paganini May 05, 2016
A High-Severity flaw in OpenSSL allows the HTTPS Traffic decryption

OpenSSL has the patches for six flaws including two high-severity bugs that could allow attackers to decrypt HTTPS traffic and execute malicious code on the server. OpenSSL just released several patches to fix vulnerabilities in the open-source cryptographic library, including a couple of high-severity flaws (CVE-2016-2107, CVE-2016-2108) that could be exploited to decrypt HTTPS Traffic. The CVE-2016-2107 could […]

Pierluigi Paganini May 05, 2016
Attackers can hack CISCO TelePresence boxes with an HTTP request

Cisco Systems has found and fixed a critical vulnerability tied to its CISCO TelePresence hardware that allowed attackers to access it via an API bug. Cisco announced it has patched a critical flaw (CVE-2016-1387) affecting its TelePresence systems that allowed unauthorized third-parties to access them by exploiting an API bug. The vulnerability has been rated as […]

Pierluigi Paganini May 04, 2016
RAF drone fleet will double and will include the new Protector UAVs

The British Britain will introduce in its fleet of armed surveillance drones a new generation of unmanned aircraft including the new Protector aircraft. The British Britain will introduce in its fleet of armed surveillance drones a new generation of unmanned aircraft. The overall number of air crafts in the fleet will double, the new  aerial vehicles will have […]

Pierluigi Paganini May 04, 2016
Google fixes 40 Critical and High Severity flaws in Android

Patches for 40 high and medium severity vulnerabilities have been included in Google’s May 2016 security update for the Android operating system. Patches for 40 vulnerabilities have been included in Google’s May 2016 security update for the Android operating system. Many high and medium severity vulnerabilities, in addition to one low severity vulnerability, are patched […]