• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • WeChat users targeted by hackers using recently disclosed Chromium exploit
  • Crooks stole driver’s license numbers from Geico auto insurer
  • Experts demonstrated how to hack a utility and take over a smart meter
  • Crooks made more than $560K with a simple clipboard hijacker
  • XCSSET malware now targets macOS 11 and M1-based Macs
  • Nitroransomware demands gift codes as ransom payments
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber Crime (Page 374)

Cyber Crime

Android botnets on the rise – case study

Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and in general of mobile cyber threats. Mobile botnets are malicious infrastructures that are increasing with impressive trend especially...

July 1, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Self-propagating ZeuS source code offered for sale in the underground

A new variant of Zeus trojan is offered for sale in the underground. It is a Self-propagating version that exploits Facebook, the RDP and the email. The criminal history taught us that after the diffusion of source code of malicious agent such as the popular...

June 30, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

Attacks-as-a-Service, MaaS, FaaS different terms same success history

Attacks-as-a-Service, Malware-as-a-Service and Fraud-as-a-Service, are all terms used to better qualify the complex evolution of cybercrime offer. Attacks-as-a-Service , Malware-as-a-Service and Fraud-as-a-Service are all terms commonly used...

June 25, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

US law enforcers suggest a kill switch for mobile and Apple adapts

US law enforcers suggest a kill switch for mobile devices to principal manufactures and Apple adapts. The idea of US law enforcers is the realization of a kill switch on mobile devices that would be used in case of theft. New York's top prosecutor,...

June 21, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

Carberp banking Trojan source code for sale at $5K in the underground

Security firm Group-IB has discovered on an forum in the underground the sale for Carberp banking Trojan source code at $5K. Carberp banking Trojan is experiencing a new youth in the underground, in the last months investigation at security firm Group-IB...

June 19, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

Zeus Trojan steals funds and recruits Money Mules

Security firm Trusteer detected a new variant of Zeus Trojan that steals funds and recruits Money Mules proposing jobs ads to the victims using Man-in-the-Browser (MitB) techniques. Zeus Trojan is becoming even more complex, its evolution is unpredictable...

June 18, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

US Cloud hosting providers targeted by cybercriminals

US Cloud hosting providers are chosen with increasing frequency as privileged targets of cybercrime, these platforms are ideal for the launch of cyber attacks financially motivated. Cloud hosting providers are becoming privileged targets of cybercrime,...

June 14, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

The business behind a hacked email account

Which is the commercial value of a hacked email account in the underground? How cybercriminals use a compromised email account? Why do they have to hit me? Which is the commercial value of a hacked email account in the underground? Brian Krebs has recently...

June 13, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

Zeus Evolution.Is RBN really linked to Facebook Zeus variant?

Is RBN (Russian Business Network) really linked to Facebook Zeus variant? Exclusive interview with WhiteHat who has investigated on the malware. RBN or ordinary crime, Zeus is appearing in new forms and using new infection channels but according some...

June 12, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Social Networks 

Profiling the offer in criminal underground

Periodic analysis of the evolution of the offer in the underground criminal thanks to the efforts of experts such as Dancho Danchev. The offer of cyber criminals in the underground is very dynamic and articulated and its observation is a privileged point...

June 9, 2013  By Pierluigi Paganini   Posted In  Cyber Crime 


« First‹ Previous370371372373374375376377378Next ›Last »
Page 374 of 396



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT