• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Half of actively exploited zero-day issues in H1 2022 are variants of previous flaws
  • The role of Social Media in modern society - Social Media Day 22 interview
  • Experts shared PoC exploit code for RCE in Zoho ManageEngine ADAudit Plus tool
  • A ransomware attack forced publishing giant Macmillan to shuts down its systems
  • SessionManager Backdoor employed in attacks on Microsoft IIS servers worldwide
  • A long-running cryptomining campaign conducted by 8220 hackers now targets Linux servers
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber Crime (Page 454)

Cyber Crime

Anonymous, DNS Amplification Attacks for Operation Global Blackout

In this first couple of months of 2012 we have assisted to an escalation of cyber attacks made by  groups of hacktivist, first Anonymous, that have hit main institutions and agencies all over the world. The modus operandi of the group is now well known,...

March 9, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Security 

Cyberespionage and new opportunities for cybercrime

The continued technology push that is shaping our society during the last decade has brought an exponential increase in computer crimes,  every technology innovation has in fact represented an opportunity for industry of crimeto make profitable frauds...

March 8, 2012  By Pierluigi Paganini   Posted In  Cyber Crime 

Mud against Anonymous using Zeus malware

Symantec company recently has disclosed the news that the collective Anonymous has deceived his supporters favoring the spread and installing of Zeus malware on their machines. The charge is heavy and would undermine the trust that underpins the recruitment...

March 6, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Digital ID  Hacking  Intelligence  Malware 

NASA unprepared for cyber attacks

Everything started last week when has been announced that a laptop stolen from NASA during last year contained command codes used to control the International Space Station. The news is sensations as worrying, is it possible to store so sensible information...

March 5, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Intelligence  Security 

Young cyber army, cyber threat or resource to enhance?

We live in economically tumultuous days and even more in the cyberspace. Not a day goes by that you do not observe a striking hack, yet another multinational ridiculed and made bare and vulnerable to human eyes. It's happened with Sony, with RSA with Stratfor,...

February 29, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Security 

Banking sector under attack, are we ready to the challenge?

Where can I find money? At the bank of course, this is the thought which underlies dell'orietamento of cyber crime that seems to have targeted the banking industry and its services. The event is not new but the intensification of efforts in this area...

February 16, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware  Security 

KPN hacked, who and when warned users?

The nightmare of every Internet Service Provider has materialized in The Netherlands where KPN company, one of the main ISPs, has stopped to provide any email services after that a group of hackers has published the credentials of more than 500 customers...

February 11, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Illustrious victim, Cia.gov Tango Down by Anonymous

Just this morning I wrote in my article the ability of the Anonymous group that stands out in my assessment for the effectiveness of its operations. I tried to analyze the phenomenon, and I noticed that many colleagues tend to approach hacktivists ideology...

February 10, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

DDoS, IPv6 is an excuse to talk about

The day has come, Network service providers are reporting the first IPV6 distributed denial-of-service (DDoS) attacks and the event is extremly significat from a secutity point of view. The news has been reported in the Arbor Networks' 7th Annual Worldwide...

February 9, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Security 

Anonymous vs FBI, threat or voice to listen?

No doubts about the ability of the Anonymous group since the beginning years have intensified their activities demonstrating great technical skills. As always, the movement gives voice to social dissent and protest against amendments and decisions of governments...

February 5, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 


« First‹ Previous450451452453454455456457458Next ›Last »
Page 454 of 459



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT