• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • NON-STATE ACTORS IN THE CYBERSPACE: AN ATTEMPT TO A TAXONOMIC CLASSIFICATION, ROLE, IMPACT AND RELATIONS WITH A STATE’S SOCIOECONOMIC STRUCTURE
  • LockBit 3.0 introduces important novelties, including a bug bounty program
  • Latest OpenSSL version is affected by a remote memory corruption flaw
  • Two critical flaws affect CODESYS ICS Automation Software
  • The government of Lithuania confirmed it had been hit by an intense cyberattack
  • New Matanbuchus Campaign drops Cobalt Strike beacons
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber Crime (Page 436)

Cyber Crime

FBI Android malware used for investigations

Former FBI officers revealed to the Wall Street Journal the existence of FBI Android malware that is used to spy on suspects for investigations. The FBI is using mobile Android malware to spy on suspects for its investigations, the news is not surprising...

August 5, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Q2 2013 Superfecta report, constant increase for automated attacks

FireHost Secure cloud hosting company issued Q2 2013 Superfecta report that revealed a sharp increase in blended, automated attacks. FireHost announced the Q2 2013 Superfecta report, an interesting set of statistic related to attacks against web applications. The...

July 31, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

Uncovered an unusual attacks based on anomalous file infector

Security experts uncovered an unusual cyber espionage campaign based on file infector belonging to the PE_EXPIRO family that includes information theft module Security experts at TrendMicro uncovered an unusual espionage campaign that hit United States...

July 21, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

Brute-forcing applications spotted in the wild … pros and cons

Brute forcing applications spotted in the wild demonstrates the continual interest of cybercrime ... What is the limitations of this attack technique? Cybercrime industry has a fervent creativity and  new products are daily offered in the underground....

July 19, 2013  By Pierluigi Paganini   Posted In  Cyber Crime 

“Cyber-crime, securities markets and systemic risk” study released

“Cyber-crime, securities markets and systemic risk” is the study issued by IOSCO and WFE that discussed systemic impact by cybercrime on securities markets “Cyber-crime, securities markets and systemic risk” is the title of a paper issued by The International...

July 18, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Cybercriminals Leveraging Facebook Report

Cybercriminals Leveraging Facebook is the title of  a research that provided evidence that criminal organizations are exploiting Facebook for illegal activities. Cybercriminals Leveraging Facebook, this is the title of an interesting research conducted...

July 14, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Security  Social Networks 

Gaming platforms under attack – Nintendo and Ubisoft hacks

The number of attacks against gaming platforms is constantly increasing, the recent data breach occurred to Nintendo and Ubisoft are just the tip of the iceberg. Gaming platforms are considerable privileged targets for cybercriminals but also for state-sponsored...

July 11, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking 

Profiling for underground service harvests mobile phone numbers

Dancho Danchev profiled a new service harvests mobile phone numbers advertised in the underground, the vendor also proposing SMS spamming and phone number verification service. A new service harvests mobile phone numbers advertised in the underground...

July 8, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

The cybercrime ecosystem, resources,motivations and methods

Information provided by the results of principal researches on the cybercrime reveals resources,motivations and methods and cost illegal operations. Fortinet has published early 2013 the Fortinet's 2013 cybercrime report, an interesting study on cybercriminal...

July 3, 2013  By Pierluigi Paganini   Posted In  Cyber Crime 

Android Hack-Tool discovered by F-Secure

Android Hack-Tool discovered by F-Secure confirming that cyber threats targeting Android devices are rapidly growing in quantity and sophistication level. F-Secure has recently announced the discovery of an Android Hack-Tool that is able to steal data...

July 3, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 


« First‹ Previous432433434435436437438439440Next ›Last »
Page 436 of 459



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT