• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Signal is down for multiple users worldwide
  • Expert launched Malvuln, a project to report flaws in malware
  • Winnti APT continues to target game developers in Russia and abroad
  • Cisco says its RV routers will no longer receive updates
  • Expert discovered a DoS vulnerability in F5 BIG-IP systems
  • Operation Spalax, an ongoing malware campaign targeting Colombian entities
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber Crime (Page 380)

Cyber Crime

Banking sector under attack, are we ready to the challenge?

Where can I find money? At the bank of course, this is the thought which underlies dell'orietamento of cyber crime that seems to have targeted the banking industry and its services. The event is not new but the intensification of efforts in this area...

February 16, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware  Security 

KPN hacked, who and when warned users?

The nightmare of every Internet Service Provider has materialized in The Netherlands where KPN company, one of the main ISPs, has stopped to provide any email services after that a group of hackers has published the credentials of more than 500 customers...

February 11, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Illustrious victim, Cia.gov Tango Down by Anonymous

Just this morning I wrote in my article the ability of the Anonymous group that stands out in my assessment for the effectiveness of its operations. I tried to analyze the phenomenon, and I noticed that many colleagues tend to approach hacktivists ideology...

February 10, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

DDoS, IPv6 is an excuse to talk about

The day has come, Network service providers are reporting the first IPV6 distributed denial-of-service (DDoS) attacks and the event is extremly significat from a secutity point of view. The news has been reported in the Arbor Networks' 7th Annual Worldwide...

February 9, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Security 

Anonymous vs FBI, threat or voice to listen?

No doubts about the ability of the Anonymous group since the beginning years have intensified their activities demonstrating great technical skills. As always, the movement gives voice to social dissent and protest against amendments and decisions of governments...

February 5, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Underestimate the threat, a serious error

In recent years it has fully understood the offensive capability of the use of cyber weapons, highly efficient tools to move attacks and espionage operations in total coverage. The effectiveness of the cyber threat is linked not only to its intrinsic...

February 4, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware  Social Networks 

Terrorism acts vs cyber threats, new offense scenarios

We are at an historical turning point today in U.S., and the situation is similar all over the world, threat of terrorist acts have been surpassed by cyber threats, this is the opinion of FBI Director Robert Mueller. Cyber crime, cyber-espionage, massive...

February 2, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Intelligence  Security 

New Drive-By Spam Infects unsuspecting users

The threat arrives via email, is now read consuetidine attacks that use email as a vector for spreading malware. Until now we have observed as typical scenario for the contagion an unsuspecting user that clicks on a link in the body of email that started...

February 1, 2012  By Pierluigi Paganini   Posted In  Cyber Crime 

Cybersecurity market, reflections on the future

Just yesterday I was impressed by a news published on a web site that announced that global cybersecurity market will reach reach quote $61 billion this year, according to a report by UK-based consultancy Visiongain, an impressive amount of money that...

February 1, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

Zeus,software as a service – Implications for civil and military

As previously said the cyber crime industry is proving to be invoiced in a thriving company that knows no crisis. The reasons are countless, high profits and unpunished crimes most often the main reasons. What amazes is, however, the organization managing...

January 24, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware 


« First‹ Previous376377378379380381382383384Next ›Last »
Page 380 of 385




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.