Article published on Hakin9 IT Security Magazine - August 2012 When we speak about malware we introduce one of the worst cyber threat that daily evolve with the capacity to hit every sector without distinction. The world “malware” is really...
Article published on Hakin9 IT Security Magazine - August 2012 When we speak about malware we introduce one of the worst cyber threat that daily evolve with the capacity to hit every sector without distinction. The world “malware” is really...
This is an hot summer under the malware perspective, we have spoken of new malware for cyber espionage and of new fraud schemas based on malicious software diffusion. Many experts use to avoid malware diffusion making risky navigation and operations...
The FBI has launched an alert titled "Citadel Malware Continues to Deliver Reveton Ransomware in Attempts to Extort Money " One of the sectors most targeted by cyber attacks and by malware is the banking, during the last months we have read several times...
Shamoon is a new threat that scares security experts, it is able to destroy files on victim’s PC and overwrite the master boot record of its disks. The cyberspace has no peace, every time a malware or a botnet is detected and neutralized a new cyber...
Article Published on The Hacker New Magazine – August Edition “Botnet” Introduction The nightmare of millions of infected computers synchronized to conduct an attack on specific target finds materialization in the concept of botnet. In the classic...
Two days ago, reading the news that lawful interception malware FinFisher was discovered in the wild I thought ... "wow finally we have the evidence, probably we will debate for a long time regarding the use of this tool and of similar agents" But...
As expected a new malware for purposes of cyber espionage was once again identified by the Team of Kaspersky Lab. After Duqu, Flame and Mahdi a new cyber-espionage toolkit has been detected in the same region, the Middle East, and like its predecessor...
No doubts, one of the most advanced cyber threat to the technological evolution is the malware diffusion, we read daily news regarding new unknown agents developed by cybercriminals, governments or hacktivists, but are we really ready to reduce the exposure...
Malware once were used primarily to destroy the victim's PC, but the scenario has completely changed today. While surviving the need of wanting to harm with malicious software, for example in the development of cyber weapons, the current trend is to develop...
Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by cyber criminals and in cyber attacks during state sponsored operations in cyber warfare scenarios. This malicious software presents...