• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • NON-STATE ACTORS IN THE CYBERSPACE: AN ATTEMPT TO A TAXONOMIC CLASSIFICATION, ROLE, IMPACT AND RELATIONS WITH A STATE’S SOCIOECONOMIC STRUCTURE
  • LockBit 3.0 introduces important novelties, including a bug bounty program
  • Latest OpenSSL version is affected by a remote memory corruption flaw
  • Two critical flaws affect CODESYS ICS Automation Software
  • The government of Lithuania confirmed it had been hit by an intense cyberattack
  • New Matanbuchus Campaign drops Cobalt Strike beacons
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber Crime (Page 425)

Cyber Crime

FBI seized Tormail database, it has the access to all users emails

The Federal Bureau of Investigation (FBI) seized the database of Tormail service for its investigation on cybercrime and illegal online hacking. Do you have used the Tormail Email service to protect your privacy? Are you searching for anonymity...

January 28, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Security 

Arts and crafts retailer Michaels Stores Inc warns over credit card fraud

Michaels Stores Inc., US-based arts-and-crafts retailer, confirmed it is investigating a possible data breach affecting customer cards. Michaels Stores Inc., US-based arts-and-crafts retailer maybe is the last victim of a massive data breach, a few weeks...

January 27, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

Spear phishing against Microsoft, exposed law enforcement inquiries

Attackers breached the email accounts of Microsoft staff, probably with a spear phishing attack, accessing to documents on law enforcement inquiries. Spear phishing attacks are within most insidious attacks for private companies and organizations, they...

January 26, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking 

Discovered first Win trojan to serve banking Android malware on mobile

Symantec experts recently came across a Windows malicious code that attempts to infect connected Android devices serving an Android malware. Researchers at Symantec antivirus firm have discovered a malicious code that is able to infect Android mobile...

January 25, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

2 million stolen from gas station ATMs with Bluetooth-enabled skimmers

A criminal organization hit gas station ATMs located in South America. The gang used Bluetooth-enabled skimmers to steal 2 million dollars from customers. Here we are again to write on another huge Credit Card theft that hit ATMs located at Gas Stations...

January 24, 2014  By Pierluigi Paganini   Posted In  Cyber Crime 

Spam campaign advertise WhatsApp for PC-beware it is a Trojan banker

Kaspersky Lab malware expert Dmitry Bestuzhev revealed a large-scale spam email campaign that is advertising the PC version of the mobile WhatsApp app to spread a banking trojan. A large-scale spam email campaign is advertising the PC version of the popular...

January 23, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

Who is spying on Tor network exit nodes from Russia?

Researchers Winter and Lindskog identified 25 nodes of Tor network that tampered with web traffic, decrypted the traffic, or censored websites. Two researchers, Philipp Winter and Stefan Lindskog of Karlstad University in Sweden, presented the results...

January 23, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

The author of BlackPOS malware professes his innocence and good faith

Thanks to efficient investigation conducted by private firms like IntelCrawler, BlackPOS author was identifyed and professes his innocence and good faith. I was within the official source to spot the 23-year-old teenager who developed the BlackPOS malware...

January 22, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

IntelCrawler update- BlackPOS author forgot delete social network page

Security experts at IntelCrawler provided a new interesting update on BlackPOS author, he forgot to delete his social network page. Intelligence firm IntelCrawler announced a few days ago that the author of the BlackPOS/Kaptoxa malware used in the attack...

January 20, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Social Networks 

IoT – Discovered first Internet of Things cyberattack on large-scale

Proofpoint discovered more Than 750,000 Phishing and SPAM Emails Launched From "Thingbots" Including Televisions, Fridge Recently security researchers from Proofpoint uncovered a cyber attack against the Internet of Things (IoT), more than 100,000...

January 19, 2014  By Pierluigi Paganini   Posted In  Cyber Crime 


« First‹ Previous421422423424425426427428429Next ›Last »
Page 425 of 459



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT