Blog Posts - Hi-tech News



Come evitare che Facebook usi i nostri dati di WhatsApp

WhatsApp e Facebook sono e rimarranno due applicazioni separate sul nostro smartphone. Ma l’aggiornamento dei termini e dell’informativa sulla privacy dell’iconcina di messaggistica (comunicato qui) le avvicina molto. E porta le imprese all’i...
by MondoUnix on Aug 29, 2016

Mr. Robot, la serie tv diventa un videogame

Per una serie tv così legata al mondo degli hacker e dell’informatica, l’arrivo di un videogioco era praticamente obbligatorio. Ecco allora che dalla Gamescom, l’annuale fiera di Colonia dedicata al mondo videoludico, è arrivato l’annuncio...
by MondoUnix on Aug 29, 2016

Dropbox email warns users that old passwords must be reset

http://www.theinquirer.net/inquirer/news/2469065/dropbox-email-warns-users-that-old-passwords-must-be-reset (15)...
by MondoUnix on Aug 26, 2016

Malicious QuadRooter Apps Discovered in Google Play Store

The recent disclosure of a set of vulnerabilities in the Android operating system that could potentially put over 900 million devices at risk may have been patched, but its threat remains. The QuadRooter flaw, discovered by Check Point, could potenti...
by MondoUnix on Aug 24, 2016

New Pokemon Go Ransomware Creates Windows Backdoor Account

With all the frenzy around the Pokemon GO mobile game, it was only just a matter of time before attackers leveraged its popularity to spread ransomware. A new ransomware was recently discovered impersonating a Pokemon GO application for Windows. Dete...
by MondoUnix on Aug 23, 2016

The Hacker Manifesto in italiano

La coscienza di un hacker di The Mentor Scritto l'8 gennaio 1986 Un altro è stato preso oggi, è su tutti i giornali. "Adolescente arrestate in uno scandalo di crimini informatici", "Hacker arrestato dopo aver truffato una banca"... Dannati ragazzi.
by MondoUnix on Aug 23, 2016

QuadRooter le vulnerabilità che colpiscono più di 900 milioni dispositivi Android

Check Point, azienda israeliana specializzata in prodotti relativi alla sicurezza, è venuta a conoscenza di quattro nuove vulnerabilità Android. In occasione della Def Con 24, una tra le più importanti conferenze sulla sicurezza informatica, tenut...
by MondoUnix on Aug 9, 2016

Anonymous ‘declares war’ on Islamic State

Anonymous is promising its "biggest operation ever" against Islamic State militants (IS). The hacking group's "declared war" against the extremists after the attacks in Paris on Friday. In a YouTube video, a spokesman wearing the group's signature ma...
by MondoUnix on Nov 18, 2015

Traduttore Google, eliminato ‘Inchallah’

(ANSA) - ROMA, 16 NOV E' stata riparata l'anomalia di Google Translate, che lunedì pomeriggio traduceva dall'italiano in qualsiasi lingua la frase "Ci rivedremo presto" con "Inchallah", parola araba che sta per "sia fatta la volontà di Allah". Lo c...
by MondoUnix on Nov 17, 2015

Why the attack on Tor matters

On Wednesday, Motherboard posted a court document filed in a prosecution against a Silk Road 2.0 user indicating that the user had been de-anonymized on the Tor network thanks to research conducted by a "university-based research institute." As Mothe...
by MondoUnix on Nov 16, 2015

More ransomware shenanigans

Recently, an update of the infamous CryptoWall ransomware (or cryptoware) was released - you can read more about that particular ransomwere here: CryptoWall 4.0 released with new Features such as Encrypted File Names Additionally, another ransomware...
by MondoUnix on Nov 15, 2015

Linux Crypto Ransomware Issue Hits 40,000 Sites

RUSSIAN ANTIVIRUS OUTFIT Dr Web has carried on studying the Linux.Encoder.1 trojan threat and reported some more bad news about increased infection. The firm revealed the problem already, but now it has more information. While before we spoke of infe...
by MondoUnix on Nov 14, 2015

Google reveals Samsung Galaxy S6 Edge’s security flaws

Google has highlighted 11 security flaws in Samsung's flagship Android handset, the Galaxy S6 Edge. The vulnerabilities include a loophole that could have been used by hackers to gain control of a victim's phone. Most of the issues were fixed after G...
by MondoUnix on Nov 6, 2015

The first rule of zero-days is no one talks about zero-days

How do you defend yourself against the unknown? That is crux of the zero-day vulnerability: a software vulnerability that, by definition, is unknown by the user of the software and often its developer as well. Everything about the zero-day market, fr...
by MondoUnix on Oct 21, 2015

Pawn Storm attack: Flash zero-day exploit hits diplomatic inboxes

Hackers behind a long-running cyber-espionage campaign have begun using a new Adobe Flash zero-day exploit in their latest campaign. The attackers behind Pawn Storm targeted several foreign affairs ministries from around the globe using a Flash-based...
by MondoUnix on Oct 16, 2015

Security bugs in global mobile networks exposed

Mobile networks around the world have been penetrated by criminals and governments via bugs in the code that keeps them running, research suggests. The bugs could be abused to carry out large scale fraud and unlawful surveillance, security company Ad...
by MondoUnix on Oct 16, 2015

North Korea exploits 0-day in Seoul’s favourite word processor

FireEye researchers Genwei Jiang and Josiah Kimble say attackers from North Korea exploited a zero day vulnerability in a word processor popular with the South Korea's government. The attackers went after the vulnerability (CVE-2015-6585) in the Hang...
by MondoUnix on Sep 11, 2015

Yahoo! won’t! fix! emoticon! exploit! in! death! row! Messenger!

Updated Hacker Julien Ahrens says Yahoo! Messenger contains a remote code execution hole that the Purple Palace won't fix. The buffer overflow holes (CVE-2014-7216) will keep bleeding, Ahrens says, because Yahoo! has told him the relevant app is end-...
by MondoUnix on Sep 11, 2015

Hackers spread malware via Yahoo ads

Hackers who previously exploited vulnerabilities in Adobe Flash have now used advertising on Yahoo's largest websites to distribute malware to billions, according to researchers at Malwarebytes. The technique, growing at an alarming rate, is facilita...
by MondoUnix on Sep 8, 2015

Mobile device screens recorded using the Certifi-gate vulnerability

Vulnerable plug-ins have been installed on hundreds of thousands of Android devices, allowing screens to be recorded, according to data from the scanning tool which discovered that the so-called Certifi-gate vulnerability is already being exploited i...
by MondoUnix on Aug 26, 2015


Trending Topics

Close