• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • QNAP warns of a new wave of DeadBolt ransomware attacks against its NAS devices
  • Pwn2Own Vancouver 2022 D2
  • The activity of the Linux XorDdos bot increased by 254% over the last six months
  • Conti ransomware is shutting down operations, what will happen now?
  • Google OAuth client library flaw allowed to deploy of malicious payloads
  • Pwn2Own Vancouver 2022 D1: MS Teams exploits received $450,000
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber Crime (Page 439)

Cyber Crime

Stylometric analysis to track anonymous users in the underground

Law enforcement and intelligence agencies conscious of the high risks related to cyber threats have started massive monitoring campaign, everything must be controlled to avoid unpleasant surprises. The trend is shared by every governments of the planet,...

January 10, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

My reading of the “ENISA Threat Landscape” report

The European Network and Information Security Agency (ENISA) is the EU’s agency responsible for cyber security issues of the European Union, its last report “ENISA Threat Landscape - Responding to the Evolving Threat Environment”, summarizing the principal...

January 9, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Turkey – Another story on use of fraudulent digital certificates

It’s the news of the day, a fraudulent digital certificate that could be used for active phishing attacks against Google’s web properties. Using the certificate it is possible to spoof content in a classic phishing schema or perform a man-in-the-middle...

January 4, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Digital ID  Security 

DoJ wants to indict state-sponsored hackers. What is the real purpose?

The last couple of years has been characterized by the raise of state-sponsored cyber attacks, governments have increased cyber capabilities to defend their critical infrastructures from offensive originated in the cyberspace but they also improved tactics...

December 28, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Security 

The “company” cybercrime seen by Fortinet

Fortinet company, the worldwide provider of network security appliances and a market leader in unified threat management (UTM), has recently published the report “Fortinet 2013 Cybercrime Report” that deepens the phenomenon of cybercrime. The report...

December 26, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

Android malware for SMS spam botnet

Everywhere is possible to read rivers of words on the impressive diffusion of social networks and mobile devices, both technologies used in the last months as privileged channels of attacks due their large audience. We all know how much dangerous are botnets...

December 25, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

Group-IB: Banking trojan «Carberp» sales were reborn with bootkit module

During the last week introduced you the excellent work done by the Group-IB, a security firm resident of the Moscow-based Skolkovo Foundation that has received a grant in the amount of 30m rubles (approximately $966,000) for the development of a global...

December 17, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

Skynet, the potential use of Tor as a bulletproof botnet

On September 2012 the German security firm G Data Software detected a botnet with a particular feature, it is controlled from an Internet Relay Chat (IRC) server running as a hidden service of the Tor. There are pro and cons for this design choice,...

December 10, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

How were stolen 36M euro with Eurograbber malware

Zeus, a name that security experts know very well, it's one of the most prolific and dangerous malware of the history. In the years several versions have been detected, it's one of the first malware for which it has been applied an excellent business...

December 7, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

CyberCop system, a russian project against cybercrime

This time I desire to speak about an interesting initiative of Group-IB company, a resident of the Moscow-based Skolkovo Foundation, that has received a grant in the amount of 30m rubles (approximately $966,000) for the development of a global counter-cybercrime...

December 3, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Security 


« First‹ Previous435436437438439440441442443Next ›Last »
Page 439 of 454



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT