• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Cyber Defense Magazine – March 2021 has arrived. Enjoy it!
  • Bug bounty hunter awarded $50,000 for a Microsoft account hijack flaw
  • Attackers took over the Perl.com domain in September 2020
  • Four zero-days in Microsoft Exchange actively exploited in the wild
  • Google fixes Critical Remote Code Execution issue in Android System component
  • Pwn20wnd released the unc0ver v 6.0 jailbreaking tool
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber Crime (Page 372)

Cyber Crime

HTTP-Botnets: The Dark Side of a Standard Protocol!

When the HTTP protocol was born in 1999, no one ever thought it will be used by one of the most dangerous Cyber threats called Botnet. A bot is an application that can perform and repeat a particular task faster than a human. When a large number of bots...

April 22, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Group-IB detected malware that hit Russian stock-trading platform

Security firm Group-IB has detected a new variant of malware that targets the popular Russian stock-trading platform QUIK (Quik Broker, Quik Dealer) provided by Russian software developers ARQA Technologies. The malware has been used during various attacks...

April 20, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

Anonymous #OpIsrael, use of botnets & hypothesis on attackers

We all remember the debated attacks of Anonymous collective against Israeli government that targeted various websites of the country last April 7th. The data on the cyber attacks reported by Israel government are really different from the one provided...

April 18, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Intelligence 

In the mind of cybercriminals – The Boston Marathon attack

To fight the cybercrime we must start thinking like criminals, they are people motivated solely by money and the need to monetize every operation. I wrote, like many other colleagues, various articles on phishing attacks and their potential effects, of course...

April 17, 2013  By Pierluigi Paganini   Posted In  Cyber Crime 

DHS alerted energy companies on ongoing spear-phishing campaign

Cyber espionage is considerable as  one of the most aggressive and dangerous cyber threats, its silent operation could steal sensitive information, company secrets and intellectual properties for a long time. Recently many cyber espionage campaigns have...

April 16, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

Bitcoin in the storm and cybercrime try to take advantage of it

As can be imagined and anticipated the soar of Bicoin value has attracted the interest of cybercrime, recently we read of malware authors and botmasters that trying to exploit new and old channels to steal virtual currency or mine it using computational...

April 15, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

How cybercrime uses a compromised Skype account

In various articles I wrote on the large diffusion of botnets and the capabilities of malicious agents to use as spread channel the social media platforms or popular applications. The diffusion and management of a botnet architecture has never been...

April 10, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware 

Wandering in the underground, from exploit kits to hacking services

The cybercrime industry knows no crisis, new services are offered in the underground and criminals operating in different sectors are increasing their interest in the possibility to adopt cyber tools to organize prolific scam and fraud. Underground...

April 9, 2013  By Pierluigi Paganini   Posted In  Cyber Crime 

Cybercrime follows money, malware for Bitcoin mining spread via Skype

Recently I wrote an article related the link between the soar of Bicoin value and expected increased interest of cybercrime to the virtual currency. In the post I anticipated the we will assist to the increase of DDoS attacks and data breach against...

April 8, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

Soaring of Bitcoin value continues to attract cybercrime

Surge in the value of , also increasing crimes related to the currency digital The most attentive readers and those who are interested in the main trends of virtual currency will surely have noticed the soaring of prices of Bitcoin in the last month,...

April 5, 2013  By Pierluigi Paganini   Posted In  Cyber Crime 


« First‹ Previous368369370371372373374375376Next ›Last »
Page 372 of 391



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT