• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Over 30k Internet-Exposed QNAP NAS hosts impacted by CVE-2022-27596 flaw
  • Pro-Russia Killnet group hit Dutch and European hospitals
  • New Prilex PoS Malware evolves to target NFC-enabled credit cards
  • New LockBit Green ransomware variant borrows code from Conti ransomware
  • Nevada Ransomware Has Released Upgraded Locker
  • TrickGate, a packer used by malware to evade detection since 2016
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Malware (Page 386)

Malware

Call it Flame, Flamer or Skywiper … it’s a new cyber weapon

The day is come, The Iranian Computer Emergency Response Team (MAHER) announced to have discovered a new targeted malware which has hit the country, that has been named Flame (also known as Flamer or Skywiper due the name of  its main modules). In...

May 28, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Malware 

McAfee Report on alarming growth of cyber threats

I find really interesting the report released by security firms regarding the principal cyber threats and the related evolution. This time I desire to share the data proposed in the by McAfee Labs in its McAfee Threats Report - First Quarter 2012. Let's...

May 25, 2012  By Pierluigi Paganini   Posted In  Malware  Security 

Zeus P2P variant against Facebook,Hotmail,Yahoo & Google Mail

The experts of Trusteer firm have discovered a new variant Zeus malware responsible of  a series of attacks against principal internet service providers. The variant carried out attacks using the P2P network architecture targeting users of Facebook,...

May 17, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

FBI on Bitcoin,between cybercrime opportunity & digital choice

Law enforcement, FBI first, are worried by the diffusion of the Bitcoin network that could be used by groups of criminals for several activities. The main problem related to the payment system is that is completely anonymous making impossible to trace...

May 11, 2012  By Pierluigi Paganini   Posted In  Malware  Security 

Flashback Trojan, a business opportunity for all

Many people who do not work in our sector are asking me two questions with increasing frequency: Can a virus infect a MAC pc? Is it possible to monetize a malware development? How is it possible? Obvious my answers, we cannot think of a software...

May 2, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

DNSChanger , much ado about nothing and the wrong choice

 Summary of previous episodes In beginning of the year a news circulated on internet regarding the planned blackout of Internet for millions of users on March 8th decided by FBI to deal with DNSChanger Trojan. The action must be done to stop the diffusion...

April 26, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Iran,Oil Industry under cyber attack,are we close to a military strike?

A new cyber attack against Iran, in particular this time the Oil Industry was the target of a Malware Attack. The news was widespread by Officials in the Iranian oil ministry, they say that their network and the country's main oil export terminal were...

April 24, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware  Security 

Flashback? Are you joking? There aren’t malware for Mac

Yesterday I discussed with a friend and colleague Francesco on the lack of awareness of Apple's users on malware that plague products of the house in Cupertino. This consideration is one of the reasons of the success in malware development for Apple,...

April 22, 2012  By Pierluigi Paganini   Posted In  Malware  Security 

Cyber threats in mobile environment

Today I desire to share with you the results of a study of Trend Micro security firm focused on mobile threat incidents related to the first quarter of 2012. The large diffusion of mobile devices and the leak of awareness on the principal cyber threats...

April 20, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Stuxnet & Duqu, update on cyber weapons usage

We all know about the malware Stuxnet and Duqu considered unanimously the first examples of cyber weapon developed by a government to silent attacks critical enemy infrastructures. We have written a lot on the topic, we have followed with attention the excellent...

April 19, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Intelligence  Malware  Security 


« First‹ Previous382383384385386387388389390Next ›Last »
Page 386 of 392



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version