Hacking Wisdom
Follow
Find
3.6K views | +1 today
 
Scooped by Alessandro Parisi
onto Hacking Wisdom
Scoop.it!

Trust hacking: How the Bitcoin system works

Trust hacking: How the Bitcoin system works | Hacking Wisdom | Scoop.it
[Scott Driscoll] sent us a link to his Bitcoin explanation a couple of weeks ago. We glanced at it but moved on rather quickly. It's been popping up here and there and we finally gave it the time it deserved.
more...
No comment yet.
Hacking Wisdom
Your new post is loading...
Your new post is loading...
Scooped by Alessandro Parisi
Scoop.it!

Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks

Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks | Hacking Wisdom | Scoop.it
The Syrian Electronic Army has made news for its recent attacks on major communications websites, Forbes, and an alleged attack on CENTCOM. While these attacks garnered public attention, the activities of another group - The Syrian Malware Team - have…
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

We Steal SMS: An insight into Android.KorBanker Operations

We Steal SMS: An insight into Android.KorBanker Operations | Hacking Wisdom | Scoop.it
Twelve months. That is how long we’ve known about the Android.KorBanker malware app. For a year, this app has been operational, attacking unsuspecting users who think they’re simply downloading a banking application when in fact, they’re opening their bank account…
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Firefox 32 moves to kill MITM attacks

Public key pinning, security fixes, better cache
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Not Safe For Not Working On

Not Safe For Not Working On | Hacking Wisdom | Scoop.it
There’s an old Soviet saying:If you think it, don’t say it. If you say it, don’t write it. If you write it, don’t be surprised.It’s not a pleasant way to live.  The coiner of this quote was not cel...
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Out in the Open: Hackers Build a Skype That’s Not Controlled by Microsoft | Enterprise | WIRED

Out in the Open: Hackers Build a Skype That’s Not Controlled by Microsoft | Enterprise | WIRED | Hacking Wisdom | Scoop.it
The web forum 4chan is known mostly as a place to share juvenile and, to put it mildly, politically incorrect images. But it’s also the birthplace of one of the latest attempts to subvert the NSA’s mass surveillance program. When whistleblower Edward Snowden revealed that full extent of the NSA’s activities last year, members of…
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Netflix releases home-grown DDoS detectors

Netflix releases home-grown DDoS detectors | Hacking Wisdom | Scoop.it
Planning on haxing Netflix? Don't plan it on Facebook
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks

Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks | Hacking Wisdom | Scoop.it
The Syrian Electronic Army has made news for its recent attacks on major communications websites, Forbes, and an alleged attack on CENTCOM. While these attacks garnered public attention, the activities of another group - The Syrian Malware Team - have…
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Touching a Laptop Can Break Its Encryption | MIT Technology Review

Touching a Laptop Can Break Its Encryption | MIT Technology Review | Hacking Wisdom | Scoop.it
The latest way to snoop on a computer is by measuring subtle changes in electrical potential as data is decrypted.
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis

Alessandro Parisi's insight:
While smartphone usage become more and more pervasive, people start also asking to which extent such devices can be maliciously exploited as "tracking devices". The concern is not only related to an adversary taking physical or remote control of the device (e.g., via a malicious app), but also to what a passive adversary (without the above capabilities) can observe from the device communications. Work in this latter direction aimed, for example, at inferring the apps a user has installed on his device, or identifying the presence of a specific user within a network.In this paper, we move a step forward: we investigate to which extent it is feasible to identify the specific actions that a user is doing on his mobile device, by simply eavesdropping the device's network traffic. In particular, we aim at identifying actions like browsing someone's profile on a social network, posting a message on a friend's wall, or sending an email. We design a system that achieves this goal starting from encrypted TCP/IP packets: it works through identification of network flows and application of machine learning techniques. We did a complete implementation of this system and run a thorough set of experiments, which show that it can achieve accuracy and precision higher than 95%, for most of the considered actions.
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Researchers find it’s terrifyingly easy to hack traffic lights

Researchers find it’s terrifyingly easy to hack traffic lights | Hacking Wisdom | Scoop.it
Open wireless and default passwords make controlling a city's intersections trivial.
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Cryptolocker flogged on YouTube

Cryptolocker flogged on YouTube | Hacking Wisdom | Scoop.it
Cat video encrypts all the things
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Turns Out Your Complex Passwords Aren’t That Much Safer | Enterprise | WIRED

Turns Out Your Complex Passwords Aren’t That Much Safer | Enterprise | WIRED | Hacking Wisdom | Scoop.it
When the computer security company Hold Security reported that more than 1.2 billion online credentials had been swiped by Russian hackers, many people were worried—and justifiably so. Hold isn’t saying exactly which websites were hit, but with so many credentials stolen, it’s likely that hundreds of millions of ordinary consumers were affected. Some of these…
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Fifteen new vulnerabilities reported during router hacking contest

Fifteen new vulnerabilities reported during router hacking contest | Hacking Wisdom | Scoop.it
Five popular router models were hacked during the SOHOpelessly Broken competition at DefCon 22
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Zscaler Research: A look at the new Gameover Zeus variant

Zscaler Research: A look at the new Gameover Zeus variant | Hacking Wisdom | Scoop.it
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

FBI used ‘leaky Captcha' to catch Silk Road's hidden servers

FBI used ‘leaky Captcha' to catch Silk Road's hidden servers | Hacking Wisdom | Scoop.it
Court documents reveal how law enforcement hunted Tor black market
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Scared of brute force password attacks? Just 'GIVE UP' says Microsoft

Scared of brute force password attacks? Just 'GIVE UP' says Microsoft | Hacking Wisdom | Scoop.it
Choose simple password, reuse it, ignore password strength meter and pray
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

FBI probes 'Cloud' celebrity leaks

FBI probes 'Cloud' celebrity leaks | Hacking Wisdom | Scoop.it
The FBI looks into allegations that the online accounts of celebrities have been hacked, leading to intimate pictures being posted online.
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

These 3-D Printed Skeleton Keys Can Pick High-Security Locks in Seconds | Threat Level | WIRED

These 3-D Printed Skeleton Keys Can Pick High-Security Locks in Seconds | Threat Level | WIRED | Hacking Wisdom | Scoop.it
One of the hairier unintended consequences of cheap 3-D printing is that any troublemaker can duplicate a key without setting foot in a hardware store. But clever lockpickers like Jos Weyers and Christian Holler already are taking that DIY key-making trick a step further: They can 3-D print a slice of plastic or metal that opens…
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

The executive order that led to mass spying, as told by NSA alumni

The executive order that led to mass spying, as told by NSA alumni | Hacking Wisdom | Scoop.it
Feds call it “twelve triple three”; whistleblower says it's the heart of the problem.
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Microsoft Digital Crimes Unit disrupts Jenxcus and Bladabindi malware families - Microsoft Malware Protection Center - Site Home - TechNet Blogs

Microsoft Digital Crimes Unit disrupts Jenxcus and Bladabindi malware families - Microsoft Malware Protection Center - Site Home - TechNet Blogs | Hacking Wisdom | Scoop.it
The Microsoft Malware Protection Center Blog provides information on viruses, worms and other malware and spyware and explains how Microsoft antivirus products help protect your computer
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Did you swipe your card through one of these UPS Store tills? You may have been pwned

Did you swipe your card through one of these UPS Store tills? You may have been pwned | Hacking Wisdom | Scoop.it
As many as 100k transactions spied upon by malware
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

RadSec Paper: Security Analysis of a Full-Body Scanner

Alessandro Parisi's insight:

The system provides weak protection against adaptive adversaries: It is possible to conceal knives, guns, and explosives from detection by exploiting properties of the device’s backscatter X-ray technology. We also investigate cyberphysical threats and propose novel attacks that use malicious software and hardware to compromise the the effectiveness, safety, and privacy of the device. Overall, our findings paint a mixed picture of the Secure 1000 that carries lessons for the design, evaluation, and operation of advanced imaging technologies, for the ongoing public debate concerning their use, and for cyberphysical security more broadly.

more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Hospital hack 'exploited Heartbleed'

Hospital hack 'exploited Heartbleed' | Hacking Wisdom | Scoop.it
A leading security expert alleges that hackers made use of the Heartbleed flaw to steal the personal details of 4.5 million healthcare patients.
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Blackphone rooted at BlackHat

Blackphone rooted at BlackHat | Hacking Wisdom | Scoop.it
Details awaited on privilege escalation bug
more...
No comment yet.
Scooped by Alessandro Parisi
Scoop.it!

Google leaves STUPID vuln on Nest devices

Google leaves STUPID vuln on Nest devices | Hacking Wisdom | Scoop.it
Security? But this is the Internet of Things!
more...
No comment yet.