backdoor

Pierluigi Paganini July 24, 2014
Thousands of WordPress Sites hacker through MailPoet flaw

Security experts at Sucuri form have observed a surge of cyber attacks against WordPress website which are using not updated version of MailPoet plugin. A large scale attack has hit more than 50,000 websites, the attacker exploited a recently patched vulnerability in a popular plugin for the WordPress CMS. Early July, experts at security firm Sucuri discovered […]

Pierluigi Paganini May 29, 2014
Encryption Tool TrueCrypt shuts down mysteriously. Is it unsecure?

Encryption Tool TrueCrypt shuts down mysteriously, a message on the official SourceForge-hosted page is encouraging users to adopt Microsoft Bitlocker. TrueCrypt, another myth is falling down? Many TrueCrypt users have had a nasty surprise visiting the TrueCrypt page at SourceForge, the page content warns visitors that the open source encryption software is not secure and that its […]

Pierluigi Paganini May 29, 2014
Nice Recording eXpress lawful intercept solution is flawed

Researchers at SEC Consult Vulnerability Lab discovered that Nice Recording eXpress lawful intercept software contains numerous flaws, including a backdoor. Nice Recording eXpress voice-recording package software used by law enforcement to intercept communications of suspects under investigation contains various flaws, this is the discovery of security researchers at SEC Consult Vulnerability Lab. The researchers have recently published an […]

Pierluigi Paganini May 14, 2014
NSA intercepts US-made Routers to implant surveillance backdoor

Journalist Glenn Greenwald published the last revelation of NSA surveillance, the agency tampers with US-made internet routers destined for foreign markets. A new collection of documents leaked by Edward Snowden claims the NSA intercepted US-made routers bound for export and to implant backdoor in their circuits. The allegations have been published by the journalist Glenn Greenwald, […]

Pierluigi Paganini May 12, 2014
Check Point Security Report 2014 – Malware in the enterprise

Check Point 2014 Security Report shows major security events occurred in 2013 show and provides useful information on current malware trends. Check Point Software Technologies published 2014 Security Report to highlight major security events occurred last year and show current malware trends. The data were collected monitoring network traffic from 996 organizations of various industries. Nearly 84 percent […]

Pierluigi Paganini May 05, 2014
RedSocks, An interesting vision on Malware trend in Q1

Dutch malware detection company RedSocks has issued its first Malware Trend Report related to the malicious code trends observed in the first quarter of 2014. RedSocks, a Dutch malware detection company which provides netflow-based malware detection service, has published its first Malware Trend Report Labs related to the first quarter of 2014. The report provides precious insights into the trends […]

Pierluigi Paganini April 28, 2014
How to hide a backdoor using PHP Callback Functions

Securi firm has published an interesting post to explain how malware authors could hide a backdoor using PHP Callback functions. Security expert Peter Gramantik at Security Firm has written an interesting blog post to describe how it is possible to hide a backdoor using common PHP callback functions. The technique could surprise the laymen, but malware authors are […]

Pierluigi Paganini March 31, 2014
Chinese CNCERT report raises the alarm on attacks originated overseas

The last report issued by China’s Computer Emergency Response Team (CNCERT) blames US for the majority of malware based attacks against the Chinese systems. There was once a dreaded China that violated the systems across the world and all the countries accused its cyber units to conduct aggressive and reckless hacking, today’s world politics discovered that US […]

Pierluigi Paganini March 19, 2014
Linux Operation Windigo hit 500000 PC and 25000 dedicated servers

Antivirus Firm ESET has been tracking and investigating the operation behind Linux_Ebury uncovering a sophisticated campaign called Operation Windigo. Operation Windigo is the name of a sophisticated malware-based campaign uncovered by security Experts at ESET, that exploiting the Linux/Ebury backdoor has impacted more 500,000 computers and 25,000 dedicated servers. ESET Researchers collaborated with CERT-Bund, the European Organization […]

Pierluigi Paganini March 13, 2014
Samsung Galaxy backdoor allows files access on the mobile’s storage

Replicant developers Kocialkowski has discovered a backdoor inside Samsung Galaxy which allows file access on the mobile’s storage. Android is the open source operating system most diffused, but being an open project, there are many customized versions that run  on mobile devices. Almost every mobile phone manufacturer commercializes its devices with a version of the Android OS that […]