The Hacker News Logo
Click to Subscribe

The Hacker News — Latest Cyber Security News: Pierluigi Paganini

Facebook Open URL Redirection vulnerability

Facebook Open URL Redirection vulnerability

November 16, 2013Anonymous
Security Researcher Dan Melamed discovered an Open URL redirection vulnerability in Facebook that allowed him to have a facebook.com ...
Smartphones, A Perfect Cyber Espionage and Surveillance Weapon

Smartphones, A Perfect Cyber Espionage and Surveillance Weapon

November 06, 2013Anonymous
The use of mobile devices in government environments concerns the secret service of any states, cyber espionage more often exploits th...
Critical vulnerability in Twitter allows attacker to upload Unrestricted Files

Critical vulnerability in Twitter allows attacker to upload Unrestricted Files

October 30, 2013Anonymous
Security expert Ebrahim Hegazy , Cyber Security Analyst Consultant at Q-CERT, has found a serious vulnerability in Twitter that allows a...
Short Password Reset code vulnerability allows hackers to brute-force many websites

Short Password Reset code vulnerability allows hackers to brute-force many websites

August 19, 2013Anonymous
Yesterday we received a vulnerability report in web applications from some unknown Indian Hacker, who explained that how Hackers are hi...
Cybercriminals using hijacked Cloud hosting accounts for targeted attacks

Cybercriminals using hijacked Cloud hosting accounts for targeted attacks

June 14, 2013Anonymous
US Cloud hosting providers are constantly targeted by cyber crime according the revelations of two malware researchers Mary Landesman,...
Drupal resets 1 Million Passwords after Data Breach

Drupal resets 1 Million Passwords after Data Breach

May 31, 2013Anonymous
A Drupal data breach was announced by the official Drupal Association, that Passwords for almost one million accounts on the Drupal.org we...
U.S. Department of Defense Officials are potential target of cyber espionage via social networking sites

U.S. Department of Defense Officials are potential target of cyber espionage via social networking sites

May 16, 2013Anonymous
In the recent months I had the opportunity to conduct an interesting study on the use of Social Media in the Military Sector, large d...
Anonymous Hackers Launch #OpUSA against US Banking and Government Agencies

Anonymous Hackers Launch #OpUSA against US Banking and Government Agencies

May 08, 2013Anonymous
#OpUSA campaign is officially started, the day has come, today May 7 as announced by Anonymous , a coordinated online attack will hit B...
Internet Explorer zero-day exploit targets U.S. nuke researchers

Internet Explorer zero-day exploit targets U.S. nuke researchers

May 06, 2013Anonymous
Security researchers revealed that series of " Watering Hole " has been conducted exploiting a IE8 zero-day vulnerability to ...
Fraud-as-a-Service of Zeus Malware advertised on social network

Fraud-as-a-Service of Zeus Malware advertised on social network

April 28, 2013Anonymous
Cyber crime enterprise is showing a growing interest in monetization of botnets , the most targeted sector in recent months is banking....
Anonymous #OpIsrael, cyber crime and assumptions on state-sponsored interference

Anonymous #OpIsrael, cyber crime and assumptions on state-sponsored interference

April 19, 2013Anonymous
Last April 7th the Anonymous collective hit the Israeli networks with a huge as historic offensive, for the first time an independent g...
Stuxnet 0.5 : Symantec study reveals Stuxnet was dated 2005

Stuxnet 0.5 : Symantec study reveals Stuxnet was dated 2005

February 27, 2013Anonymous
Today social media are spreading a shocking news, authors of Stuxnet virus that hit Iranian nuclear program in 2010 according a new res...
What does the Poetry with Citadel trojan ?

What does the Poetry with Citadel trojan ?

February 23, 2013Anonymous
Recently we published an article on the attacks against Japanese banks using a new variant of the popular Zeus , one of the most prolific ma...
Dissecting a mobile malware

Dissecting a mobile malware

January 27, 2013Anonymous
The capillary diffusion of mobile devices, the lack of security systems on these platforms and low level of awareness on principal cyber...
Exclusive Deals

Stay Informed — Newsletter Sign Up

Sign up for THN newsletter and get our latest stories delivered straight to your inbox.