• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • FreakOut botnet target 3 recent flaws to compromise Linux devices
  • Vishing attacks conducted to steal corporate accounts, FBI warns
  • OpenWRT forum hacked, intruders stole user data
  • 500K+ records of C-level people from Capital Economics leaked online
  • Apple paid a $50,000 bounty to two bug bounty hunters for hacking its hosts
  • Rob Joyce is the new NSA Cyber Director
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber Crime (Page 370)

Cyber Crime

New variant of banking malware Shylock spread via Skype

The news is very concerning, a new variant of the banking malware known as Shylock has been detected, it includes the capability to spread over Skype. Shylock is an old acquaintance for security community, the malware was detected for first time...

January 20, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

Bouncer, new phishing variant from RSA

Despite simplicity of the schema phishing attacks have increased exponentially in the last years targeting every sector,both public and private. RSA’s October Online Fraud Report 2012 revealed a worrying scenario, phishing attacks increased up 19% over...

January 19, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

Red October, RBN and too many questions still unresolved

The recently discovered cyber espionage campaign “Red October” has shocked world wide security community, the principal questions raised are: Who is behind the attacks? How is possible that for so long time the campaign went undetected? Which...

January 17, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Malware  Security 

New security problem for Oracle Java software

The year is start way for Oracle Java platform, a new Java 0-day vulnerability has been discovered and worldwide security community is very concerned on the potential effect of the bug. We have discovered how much dangerous could be the exploit of a zero-day...

January 12, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Security 

Stylometric analysis to track anonymous users in the underground

Law enforcement and intelligence agencies conscious of the high risks related to cyber threats have started massive monitoring campaign, everything must be controlled to avoid unpleasant surprises. The trend is shared by every governments of the planet,...

January 10, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

My reading of the “ENISA Threat Landscape” report

The European Network and Information Security Agency (ENISA) is the EU’s agency responsible for cyber security issues of the European Union, its last report “ENISA Threat Landscape - Responding to the Evolving Threat Environment”, summarizing the principal...

January 9, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Turkey – Another story on use of fraudulent digital certificates

It’s the news of the day, a fraudulent digital certificate that could be used for active phishing attacks against Google’s web properties. Using the certificate it is possible to spoof content in a classic phishing schema or perform a man-in-the-middle...

January 4, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Digital ID  Security 

DoJ wants to indict state-sponsored hackers. What is the real purpose?

The last couple of years has been characterized by the raise of state-sponsored cyber attacks, governments have increased cyber capabilities to defend their critical infrastructures from offensive originated in the cyberspace but they also improved tactics...

December 28, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Security 

The “company” cybercrime seen by Fortinet

Fortinet company, the worldwide provider of network security appliances and a market leader in unified threat management (UTM), has recently published the report “Fortinet 2013 Cybercrime Report” that deepens the phenomenon of cybercrime. The report...

December 26, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

Android malware for SMS spam botnet

Everywhere is possible to read rivers of words on the impressive diffusion of social networks and mobile devices, both technologies used in the last months as privileged channels of attacks due their large audience. We all know how much dangerous are botnets...

December 25, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 


« First‹ Previous366367368369370371372373374Next ›Last »
Page 370 of 385



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.